CVE-2026-23172

N/A Unknown

📋 TL;DR

A buffer overflow vulnerability in the Linux kernel's t7xx WWAN driver could allow malicious or buggy modem firmware to cause kernel memory corruption by sending packets with excessive fragments. This affects systems using MediaTek T7xx 5G modems with vulnerable kernel versions. The vulnerability could lead to kernel crashes or undefined behavior.

💻 Affected Systems

Products:
  • Linux kernel with MediaTek T7xx 5G modem driver (t7xx)
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with MediaTek T7xx 5G modems. Requires the t7xx driver to be loaded and active.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or potential arbitrary code execution in kernel context leading to complete system compromise.

🟠

Likely Case

Kernel crash or system instability when receiving malformed packets from modem firmware.

🟢

If Mitigated

No impact if patched or if modem firmware behaves correctly within protocol specifications.

🌐 Internet-Facing: LOW - Requires local modem access or compromised firmware, not directly internet-exploitable.
🏢 Internal Only: MEDIUM - Requires access to modem interface, which could be exploited by malicious firmware or local attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires control over modem firmware or ability to send malformed packets to the modem interface. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing the fix commits (2a0522f564acd34442652ea083091c329fa7c5d5 and related)

Vendor Advisory: https://git.kernel.org/stable/c/2a0522f564acd34442652ea083091c329fa7c5d5

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Rebuild kernel if using custom kernel with backported fix.

🔧 Temporary Workarounds

Disable t7xx driver

Linux

Unload the vulnerable t7xx driver if 5G modem functionality is not required

sudo rmmod mtk_t7xx
sudo modprobe -r mtk_t7xx

Blacklist driver

Linux

Prevent t7xx driver from loading at boot

echo 'blacklist mtk_t7xx' | sudo tee /etc/modprobe.d/blacklist-t7xx.conf

🧯 If You Can't Patch

  • Isolate systems with T7xx modems from untrusted networks
  • Monitor kernel logs for crash indicators related to t7xx driver

🔍 How to Verify

Check if Vulnerable:

Check if t7xx driver is loaded: lsmod | grep t7xx AND check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits OR test with proof-of-concept packet generation (not publicly available)

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Oops messages mentioning t7xx, dpmaif, or skb fragments
  • System crashes when modem is active

Network Indicators:

  • Unusual modem packet patterns (difficult to detect without deep packet inspection)

SIEM Query:

source="kernel" AND ("t7xx" OR "dpmaif" OR "skb" OR "frag") AND ("panic" OR "Oops" OR "BUG")

🔗 References

📤 Share & Export