CVE-2024-36921

7.8 HIGH

📋 TL;DR

This CVE addresses an out-of-bounds array access vulnerability in the Linux kernel's iwlwifi driver when handling invalid station IDs during station removal. Attackers could potentially exploit this to cause kernel crashes or execute arbitrary code. Systems using affected Intel WiFi hardware with vulnerable kernel versions are impacted.

💻 Affected Systems

Products:
  • Linux kernel with iwlwifi driver
Versions: Specific kernel versions containing the vulnerable code (check git commits for exact ranges)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel WiFi hardware using the iwlwifi driver. The vulnerability is triggered during error handling when removing stations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service, or potential arbitrary code execution with kernel privileges resulting in complete system compromise.

🟠

Likely Case

System crash or instability when the driver enters an error state, causing denial of service on affected systems.

🟢

If Mitigated

Minor system instability or crash requiring reboot, with no privilege escalation if proper kernel protections are active.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific driver error states, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers or malicious processes could potentially trigger the vulnerability to cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires triggering specific error conditions in the driver to reach the vulnerable code path with invalid station IDs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 17f64517bf5c26af56b6c3566273aad6646c3c4f, 94f80a8ec15e238b78521f20f8afaed60521a294, fab21d220017daa5fd8a3d788ff25ccfecfaae2f

Vendor Advisory: https://git.kernel.org/stable/c/17f64517bf5c26af56b6c3566273aad6646c3c4f

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Rebuild kernel if compiling from source. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable vulnerable WiFi hardware

linux

Temporarily disable Intel WiFi hardware using the iwlwifi driver

sudo modprobe -r iwlwifi

Use alternative network interface

linux

Switch to wired Ethernet or different WiFi adapter not using iwlwifi driver

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable kernels
  • Implement strict process isolation and limit driver interaction capabilities

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if iwlwifi module is loaded: lsmod | grep iwlwifi && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or is newer than patched versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • iwlwifi driver error logs in dmesg
  • System crash reports

Network Indicators:

  • Unexpected WiFi disconnections
  • Network interface failures

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "iwlwifi")

🔗 References

📤 Share & Export