CVE-2025-38348

7.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in the Linux kernel's p54 wifi driver allows a malicious USB device posing as an Intersil p54 wifi interface to trigger memory corruption. This affects Linux systems using the p54 driver, though exploitation requires physical USB access and specific firmware conditions.

💻 Affected Systems

Products:
  • Linux kernel with p54 wifi driver
Versions: Linux kernel versions before patches in stable trees
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Requires p54 driver to be loaded, which typically happens only when specific Intersil wifi hardware is present. Most distributions don't include the proprietary firmware by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to denial of service, with potential for arbitrary code execution in kernel context.

🟠

Likely Case

System crash or kernel panic causing denial of service on affected systems with vulnerable driver loaded.

🟢

If Mitigated

Minimal impact if proper USB device restrictions are enforced and driver isn't loaded.

🌐 Internet-Facing: LOW - Requires physical USB device access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Physical access to USB ports needed, but insider threats or compromised USB devices could exploit.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical USB access, specific USB device emulation, and driver loading conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees (commits: 0e4dc150423b, 12134f79e53e, 1f7f8168abe8, 6d05390d20f1, 714afb4c38ed)

Vendor Advisory: https://git.kernel.org/stable/c/0e4dc150423b829c35cbcf399481ca11594fc036

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify driver version if possible.

🔧 Temporary Workarounds

Disable p54 driver module loading

linux

Prevent the vulnerable driver from being loaded

echo 'blacklist p54' >> /etc/modprobe.d/blacklist-p54.conf
rmmod p54

Restrict USB device access

linux

Use USBGuard or similar to control which USB devices can connect

# Install USBGuard: apt install usbguard
# Configure policy to allow only trusted devices

🧯 If You Can't Patch

  • Physically disable or restrict access to USB ports on critical systems
  • Implement strict USB device policies and monitoring for unauthorized devices

🔍 How to Verify

Check if Vulnerable:

Check if p54 module is loaded: lsmod | grep p54. If loaded, check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the patch commits, and test with modinfo p54 to check driver version if available.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs mentioning p54 driver
  • USB device connection logs for suspicious wifi devices
  • System crash/reboot events

Network Indicators:

  • Unusual USB device enumeration patterns
  • Attempts to load p54 driver unexpectedly

SIEM Query:

source="kernel" AND ("p54" OR "panic" OR "Oops")

🔗 References

📤 Share & Export