-

CVE-2025-71127

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Discard Beacon frames to non-broadcast address

Beacon frames are required to be sent to the broadcast address, see IEEE
Std 802.11-2020, 11.1.3.1 ("The Address 1 field of the Beacon .. frame
shall be set to the broadcast address"). A unicast Beacon frame might be
used as a targeted attack to get one of the associated STAs to do
something (e.g., using CSA to move it to another channel). As such, it
is better have strict filtering for this on the received side and
discard all Beacon frames that are sent to an unexpected address.

This is even more important for cases where beacon protection is used.
The current implementation in mac80211 is correctly discarding unicast
Beacon frames if the Protected Frame bit in the Frame Control field is
set to 0. However, if that bit is set to 1, the logic used for checking
for configured BIGTK(s) does not actually work. If the driver does not
have logic for dropping unicast Beacon frames with Protected Frame bit
1, these frames would be accepted in mac80211 processing as valid Beacon
frames even though they are not protected. This would allow beacon
protection to be bypassed. While the logic for checking beacon
protection could be extended to cover this corner case, a more generic
check for discard all Beacon frames based on A1=unicast address covers
this without needing additional changes.

Address all these issues by dropping received Beacon frames if they are
sent to a non-broadcast address.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < be0974be5c42584e027883ac2af7dab5e950098c
Version af2d14b01c32d7cba65f73503586e5b621afb139
Status affected
Version < 0a59a3895f804469276d188effa511c72e752f35
Version af2d14b01c32d7cba65f73503586e5b621afb139
Status affected
Version < 88aab153d1528bc559292a12fb5105ee97528e1f
Version af2d14b01c32d7cba65f73503586e5b621afb139
Status affected
Version < 6e5bff40bb38741e40c33043ba0816fba5f93661
Version af2d14b01c32d7cba65f73503586e5b621afb139
Status affected
Version < 7b240a8935d554ad36a52c2c37c32039f9afaef2
Version af2d14b01c32d7cba65f73503586e5b621afb139
Status affected
Version < a21704df4024708be698fb3fd5830d5b113b70e0
Version af2d14b01c32d7cba65f73503586e5b621afb139
Status affected
Version < 193d18f60588e95d62e0f82b6a53893e5f2f19f8
Version af2d14b01c32d7cba65f73503586e5b621afb139
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.7
Status affected
Version < 5.7
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.65
Status unaffected
Version <= 6.18.*
Version 6.18.4
Status unaffected
Version <= *
Version 6.19-rc4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.088
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.