CVE-2026-23133
📋 TL;DR
This CVE involves a memory management vulnerability in the Linux kernel's ath10k WiFi driver where dma_free_coherent() is called with incorrect pointer values. This could lead to memory corruption or kernel crashes. Systems using affected ath10k WiFi hardware with vulnerable kernel versions are affected.
💻 Affected Systems
- Linux kernel with ath10k WiFi driver
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, potential denial of service, or memory corruption that could be leveraged for privilege escalation.
Likely Case
System instability, WiFi driver crashes, or kernel panics when the affected memory management code paths are triggered.
If Mitigated
System remains stable with no impact if the vulnerable code path is not executed or if proper memory protections are in place.
🎯 Exploit Status
Exploitation requires triggering specific DMA memory operations in the ath10k driver
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing the fix commits (07f363f30579, 1928851334ec, 5d6fa4d2c979, 9282a1e171ad, b0ad924332a9)
Vendor Advisory: https://git.kernel.org/stable/c/07f363f305793baecad41816f73056252f3df61e
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Rebuild kernel if compiling from source. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable ath10k WiFi
allTemporarily disable the vulnerable ath10k driver to prevent exploitation
sudo modprobe -r ath10k_pci
sudo modprobe -r ath10k_core
🧯 If You Can't Patch
- Disable WiFi functionality using ath10k hardware
- Implement strict access controls to limit who can use WiFi interfaces
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if ath10k modules are loaded: lsmod | grep ath10k
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits and ath10k driver loads without errors
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- ath10k driver crash logs
- DMA allocation/deallocation errors in kernel logs
Network Indicators:
- Sudden WiFi interface disappearance
- Intermittent WiFi connectivity
SIEM Query:
kernel: "ath10k" AND ("panic" OR "BUG" OR "Oops" OR "segfault")
🔗 References
- https://git.kernel.org/stable/c/07f363f305793baecad41816f73056252f3df61e
- https://git.kernel.org/stable/c/1928851334ecfd6e0d663121ab69ac639d4217a6
- https://git.kernel.org/stable/c/5d6fa4d2c9799c09389588da5118a72d97d87e92
- https://git.kernel.org/stable/c/9282a1e171ad8d2205067e8ec3bbe4e3cef4f29f
- https://git.kernel.org/stable/c/b0ad924332a96550a84b8c0ae5483e7042d65fa9
- https://git.kernel.org/stable/c/e2dda298ef809aa201ea7c0904c4d064f6c497cb
- https://git.kernel.org/stable/c/fc8da65f9fe1bc6802f8240b342cfff4f5c7e841