Thursday, January 30, 2025
HomeCVE/vulnerabilityCritical Wi-Fi Bug In Linux Let Hackers Take Complete Control and Crash...

Critical Wi-Fi Bug In Linux Let Hackers Take Complete Control and Crash The System Remotely

Published on

SIEM as a Service

Follow Us on Google News

A newly discovered critical Wi-Fi vulnerability in Linux lets attackers compromise the system with the help of nearby Wi-Fi devices and crush the vulnerable machine.

The vulnerability resides in the “rtlwifi” driver that mainly supports the Realtek Wi-Fi chips model used in Linux devices.

By exploiting the vulnerability, the attacker will trigger the buffer overflow attack in the Linux kernel when the vulnerable Linux system with the Realtek Wi-Fi chip nearby the malicious device that handled by the attack.

A buffer overflow occurs when the process or a specific program attempts to write more data in buffer or block of memory than the actual buffer is allocated to hold the data.

A successful buffer overflow attack could trigger a response that damages files, change data or unveils private information, alter the data, and sometimes open the backdoor for attackers.

According to Nico Waisman, Security Engineer in GitHub “It’s a vulnerability that triggers an overflow remotely through Wi-Fi on the Linux kernel, as long as you’re using the Realtek (RTLWIFI), the driver.”

To exploit the vulnerability, an attacker needs to be nearby in a specific range of the vulnerable Linux machine, and he sends a “malicious” packet that will trigger the vulnerability and leads to a system crash.

Notice of Absence protocol, a feature in rtlwifi driver in Linux to helps devices autonomously power down their radio to save energy.

The flaw exists in how the driver handles the “Notice of Absence” protocol built into Wi-Fi Direct ( a standard that allows two devices to connect over Wi-Fi without the need of an access point) in which an absence of checking the certain packets for a compatible length, the attack can add the specfic new information elements to crash the system.

The vulnerability only affects Linux devices that use a Realtek chip when Wi-Fi is turned on. The flaw can’t be triggered if Wi-Fi is turned off or if the device uses a Wi-Fi chip from a different manufacturer.

The vulnerability is tracked as CVE-2019-17666 and the Linux developers promise to fix the vulnerability coming days or weeks. Later the patch will be available for other Linux distributions.

Also Read: A Vulnerability In Linux Sudo Let the Restricted Linux Users to Run Commands as Root

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS...

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Lynx Ransomware Architecture to Attack Windows, Linux, ESXi Uncovered

The emergence of the Lynx Ransomware-as-a-Service (RaaS) platform has drawn significant attention in cybersecurity...

Hackers Attacking Windows, macOS, and Linux systems With SparkRAT

Researchers have uncovered new developments in SparkRAT operations, shedding light on its persistent use...

Windows CLFS Buffer Overflow Vulnerability CVE-2024-49138 – PoC Released

 A recently disclosed Windows kernel-level vulnerability, identified as CVE-2024-49138, has raised significant security concerns in...