CVE-2025-38290

5.5 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's ath12k WiFi driver can cause kernel panic during WLAN recovery when virtual interface removal occurs simultaneously. This affects systems using Qualcomm Atheros ath12k wireless chipsets. The vulnerability requires specific timing conditions to trigger.

💻 Affected Systems

Products:
  • Linux kernel with ath12k driver
Versions: Linux kernel versions containing vulnerable ath12k driver code before fixes were applied
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ath12k driver to be loaded and in use with Qualcomm Atheros WiFi hardware (QCN9274 and similar chipsets).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical access to reboot affected systems.

🟠

Likely Case

System instability or crashes during WiFi operations, particularly when network interfaces are being reconfigured or during recovery events.

🟢

If Mitigated

Minor system instability that may require manual intervention to restore WiFi functionality.

🌐 Internet-Facing: LOW - Requires local access to trigger and specific timing conditions.
🏢 Internal Only: MEDIUM - Could be triggered by legitimate network operations or misconfigured clients on internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires precise timing during WLAN recovery and vif removal operations, making reliable exploitation difficult.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commit 6285516170f9e2f04b9dbf1e5100e0d7cbac22b4 or later

Vendor Advisory: https://git.kernel.org/stable/c/6285516170f9e2f04b9dbf1e5100e0d7cbac22b4

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Reboot system to load patched kernel. 3. Verify ath12k driver is functioning correctly.

🔧 Temporary Workarounds

Disable ath12k driver

linux

Prevent loading of vulnerable ath12k driver module

echo 'blacklist ath12k' >> /etc/modprobe.d/blacklist-ath12k.conf
update-initramfs -u
reboot

Disable WiFi recovery features

linux

Reduce likelihood of triggering the race condition

echo 'options ath12k recovery_disable=1' >> /etc/modprobe.d/ath12k.conf
reboot

🧯 If You Can't Patch

  • Monitor system logs for kernel panic events related to ath12k
  • Implement network segmentation to limit WiFi client access to critical systems

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if ath12k module is loaded: lsmod | grep ath12k

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commit: uname -r and check kernel changelog for commit 6285516170f9e2f04b9dbf1e5100e0d7cbac22b4

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning ath12k, list_del, or __list_del_entry_valid_or_report
  • System crash dumps during WiFi operations

Network Indicators:

  • Sudden WiFi disconnections followed by system instability
  • Failed network interface operations

SIEM Query:

event_source:kernel AND (message:*ath12k* OR message:*list_del* OR message:*panic*)

🔗 References

📤 Share & Export