CVE-2025-71227
Improper Channel Validation Warning in Linux mac80211 Wi-Fi
Publication date: 2026-02-18
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 3.8 (inc) to 6.18.10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability could cause the Linux kernel to produce warnings when connecting to wifi channels that have become invalid due to regulatory changes. This might lead to confusion or misinterpretation of the system's state. The fix improves the clarity of error reporting, potentially reducing troubleshooting difficulties and improving system stability when dealing with dynamic regulatory changes.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
Can you explain this vulnerability to me?
This vulnerability relates to the Linux kernel's wifi mac80211 component. It involves the system generating warnings when attempting to connect on invalid wifi channels. The issue arises because a channel that was initially considered usable during scanning might become disabled due to regulatory changes before the connection attempt. Instead of a warning, the fix replaces it with a more informative error message to better handle this scenario.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know