CVE-2021-47135

7.8 HIGH

📋 TL;DR

This CVE-2021-47135 is an array out-of-bounds vulnerability in the mt7921 wireless driver in the Linux kernel. It could allow local attackers to cause denial of service or potentially execute arbitrary code by triggering the bug in the rate reporting function. Systems using affected Linux kernel versions with mt7921 wireless hardware are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with mt76 wireless driver
Versions: Linux kernel versions with vulnerable mt7921 driver before fixes were applied
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires mt7921 wireless hardware to be present and driver loaded. The vulnerability is in the mt7921_mcu_tx_rate_report function.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, potentially leading to full system compromise.

🟠

Likely Case

Kernel panic or system crash causing denial of service, requiring reboot.

🟢

If Mitigated

Minimal impact if proper kernel hardening and privilege separation are in place.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly reachable from internet.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to crash systems or potentially gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger the specific wireless driver function. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 6919e8a24e70b6ba148fe07f44f835bcdd1a8d02 and d874e6c06952382897d35bf4094193cd44ae91bd

Vendor Advisory: https://git.kernel.org/stable/c/6919e8a24e70b6ba148fe07f44f835bcdd1a8d02

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable mt7921 wireless module

linux

Prevent loading of vulnerable wireless driver if not needed

echo 'blacklist mt7921e' >> /etc/modprobe.d/blacklist.conf
rmmod mt7921e

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable kernel
  • Implement strict privilege separation and limit user capabilities

🔍 How to Verify

Check if Vulnerable:

Check if mt7921 driver is loaded: lsmod | grep mt7921. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check that mt7921 driver version includes the fix commits.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • OOPs messages related to mt7921 driver
  • System crash/reboot events

Network Indicators:

  • Unusual wireless interface behavior

SIEM Query:

source="kernel" AND ("mt7921" OR "OOPs" OR "kernel panic")

🔗 References

📤 Share & Export