CVE-2026-43110
Buffer Overflow in Linux Kernel WiFi Driver
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| brcm | brcmfmac | * |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's wifi driver brcmfmac. Specifically, the function brcmf_fweh_handle_if_event() does not properly validate the bsscfg index before using it as an array index. Although it validates the firmware-provided interface index before accessing the iflist array, it still uses the raw bsscfgidx field without a proper range check. This can lead to improper indexing of the interface array.
How can this vulnerability impact me? :
Improper validation of the bsscfg index could potentially lead to out-of-bounds array access in the wifi driver. This might cause unexpected behavior such as crashes, memory corruption, or other stability issues in the Linux kernel's wifi subsystem.