CVE-2025-38512
BaseFortify
Publication date: 2025-08-16
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves A-MSDU spoofing attacks in mesh networks within the Linux kernel's WiFi implementation. An attacker can manipulate standard MSDU frames to appear as aggregated A-MSDU frames, potentially bypassing security checks. The vulnerability arises because the initial IEEE 802.11 update missed this attack vector in mesh networks. The patch mitigates this by detecting if a standard MSDU was turned into an A-MSDU by parsing the frame and checking specific header fields to identify spoofing attempts.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker to spoof aggregated WiFi frames in mesh networks, potentially leading to unauthorized network access, data interception, or disruption of network communications. This could compromise the integrity and confidentiality of data transmitted over the affected mesh network.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by parsing received A-MSDU frames as standard MSDUs, calculating the length of the Mesh Control header, and checking if the 6 bytes after this header match the start of an rfc1042 header. This indicates a strong likelihood of an ongoing attack attempt. However, no specific commands are provided in the available information.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is mitigated by applying the patch that prevents A-MSDU spoofing in mesh networks by implementing the described detection method. Immediate steps include updating the Linux kernel to a version that includes this patch to prevent the attack.