CVE-2024-35937

7.1 HIGH

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in the Linux kernel's WiFi subsystem (cfg80211) when processing A-MSDU frames. Attackers could potentially read kernel memory by sending specially crafted WiFi packets. All Linux systems using affected kernel versions with WiFi enabled are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE description, but patches exist in stable kernel trees.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with WiFi enabled and using cfg80211 subsystem. Servers without WiFi hardware/configuration are not vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure leading to information leakage, potential privilege escalation, or system crash.

🟠

Likely Case

Information disclosure of kernel memory contents, potentially revealing sensitive data or system state.

🟢

If Mitigated

Minimal impact if WiFi is disabled or proper network segmentation prevents malicious packet injection.

🌐 Internet-Facing: MEDIUM - Requires WiFi connectivity and ability to send packets to target, but many internet-facing systems have WiFi disabled.
🏢 Internal Only: MEDIUM - Internal attackers on same network could exploit if WiFi is enabled and they can send packets to target.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires WiFi network access and ability to send crafted A-MSDU frames. No public exploit code known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees via provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/16da1e1dac23be45ef6e23c41b1508c400e6c544

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable WiFi interfaces

linux

Disable WiFi network interfaces to prevent exploitation

sudo ip link set wlan0 down
sudo nmcli radio wifi off

Network segmentation

all

Isolate WiFi networks from sensitive systems

🧯 If You Can't Patch

  • Disable WiFi on critical systems
  • Implement strict network access controls for WiFi networks

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with distribution's security advisories. Systems with WiFi enabled and unpatched kernels are vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version matches patched version from vendor advisory and WiFi functionality works normally.

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • WiFi subsystem errors in dmesg
  • Network interface errors

Network Indicators:

  • Unusual A-MSDU frame patterns
  • Malformed WiFi packets

SIEM Query:

source="kernel" AND ("cfg80211" OR "A-MSDU" OR "out of bounds")

🔗 References

📤 Share & Export