Impact
The defect causes a kernel NULL pointer dereference when a Mesh Configuration Element is missing from a received CSA action frame. An attacker can craft such a frame to trigger the crash, resulting in a denial of service as the kernel panics. The weakness is a classic NULL dereference (CWE‑476).
Affected Systems
All Linux kernel implementations that use the mac80211 wireless stack and provide mesh operation are potentially affected. The vulnerability exists in code that predates the patch adding the NULL check; any kernel configuration with this code path is at risk until the patch is applied.
Risk and Exploitability
The risk is moderate because exploitation requires the ability to inject a malformed CSA frame into the target wireless network. EPSS indicates a very low likelihood of exploitation (<1%) and the vulnerability is not listed in the CISA KEV catalog, suggesting no known widespread use. Nevertheless, a single crash will bring the affected system down until reboot, and the bug is trivial to exploit with an appropriate radio transmitter, making it a useful vector for denial of service in hostile environments.
OpenCVE Enrichment