CVE-2024-42125

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's rtw89 WiFi driver could cause kernel crashes when systems with BIOS policies blocking 6GHz WiFi attempt to perform scan operations. This affects Linux systems using rtw89 WiFi chips with BIOS configurations that disable 6GHz bands.

💻 Affected Systems

Products:
  • Linux kernel with rtw89 WiFi driver
Versions: Linux kernel versions before the fix commits (specific versions depend on distribution backports)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using rtw89 WiFi chips with BIOS policies that block 6GHz bands. WiFi 7 chips with 6GHz disabled are particularly affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

System crash or instability when WiFi scanning operations are performed on affected hardware configurations.

🟢

If Mitigated

No impact if BIOS doesn't block 6GHz bands or if the system isn't performing WiFi scans.

🌐 Internet-Facing: LOW - Requires local access to trigger via WiFi operations.
🏢 Internal Only: MEDIUM - Could be triggered by legitimate WiFi operations or malicious local users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to trigger WiFi scan operations on affected hardware. Likely discovered through code review/fuzzing rather than active exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits bb38626f3f97e16e6d368a9ff6daf320f3fe31d9 and ce4ba62f8bc5195a9a0d49c6235a9c99e619cadc

Vendor Advisory: https://git.kernel.org/stable/c/bb38626f3f97e16e6d368a9ff6daf320f3fe31d9

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check with your distribution for backported patches. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable rtw89 driver

linux

Temporarily disable the vulnerable WiFi driver

sudo modprobe -r rtw89_core
sudo modprobe -r rtw89_pci

Enable 6GHz in BIOS

all

If possible, enable 6GHz WiFi support in BIOS to avoid the NULL condition

🧯 If You Can't Patch

  • Avoid WiFi scanning operations on affected systems
  • Use alternative WiFi hardware or disable WiFi entirely if not needed

🔍 How to Verify

Check if Vulnerable:

Check if using rtw89 driver: lsmod | grep rtw89. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or is newer than vulnerable versions. Test WiFi scanning functionality.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • NULL pointer dereference errors in dmesg
  • WiFi driver crash logs

Network Indicators:

  • Unexpected WiFi disconnections
  • Failed scan operations

SIEM Query:

source="kernel" AND ("NULL pointer" OR "panic" OR "rtw89")

🔗 References

📤 Share & Export