CVE-2024-48873

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability exists in the Linux kernel's rtw89 WiFi driver. If exploited, this could cause a kernel panic or system crash on devices using this driver. This affects Linux systems with the rtw89 driver loaded, particularly those using Realtek WiFi chipsets.

💻 Affected Systems

Products:
  • Linux kernel with rtw89 driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when rtw89 driver is loaded and active (typically when using compatible Realtek WiFi hardware).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical access to restart affected systems.

🟠

Likely Case

System crash or instability when specific WiFi operations trigger the NULL pointer dereference, causing temporary denial of service.

🟢

If Mitigated

Minor system instability that self-recovers or requires manual intervention to restart affected services.

🌐 Internet-Facing: LOW - Requires local network access and specific WiFi driver interaction; not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Could be triggered by malicious internal actors on the same network or through WiFi-related attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific WiFi operations that cause ieee80211_probereq_get() to return NULL, then dereferencing that pointer.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 1a0f54cb3fea5d087440b2bae03202c445156a8d, 630d5d8f2bf6b340202b6bc2c05d794bbd8e4c1c, 7296e5611adb2c619bd7bd3817ddde7ba865ef17

Vendor Advisory: https://git.kernel.org/stable/c/1a0f54cb3fea5d087440b2bae03202c445156a8d

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load patched kernel. 3. Verify rtw89 driver is updated.

🔧 Temporary Workarounds

Disable rtw89 driver

linux

Unload the vulnerable driver if not needed

sudo modprobe -r rtw89_core
sudo modprobe -r rtw89_pci

Blacklist rtw89 driver

linux

Prevent driver from loading at boot

echo 'blacklist rtw89_core' | sudo tee /etc/modprobe.d/blacklist-rtw89.conf
echo 'blacklist rtw89_pci' | sudo tee -a /etc/modprobe.d/blacklist-rtw89.conf

🧯 If You Can't Patch

  • Disable WiFi functionality on affected systems
  • Use alternative WiFi hardware with different drivers

🔍 How to Verify

Check if Vulnerable:

Check if rtw89 driver is loaded: lsmod | grep rtw89

Check Version:

uname -r

Verify Fix Applied:

Check kernel version includes fix commits or verify driver version after update

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System crash logs
  • NULL pointer dereference errors in kernel logs

Network Indicators:

  • Unexpected WiFi disconnections
  • Network interface failures

SIEM Query:

kernel: *NULL pointer dereference* OR kernel: *rtw89* AND (panic OR oops)

🔗 References

📤 Share & Export