Description
In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't send a 6E related command when not supported

MCC_ALLOWED_AP_TYPE_CMD is related to 6E support. Do not send it if the
device doesn't support 6E.
Apparently, the firmware is mistakenly advertising support for this
command even on AX201 which does not support 6E and then the firmware
crashes.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The iwlwifi driver in the Linux kernel mistakenly sends a 6E capability command (MCC_ALLOWED_AP_TYPE_CMD) even when the underlying firmware does not advertise support for 6E. This incorrect command invocation causes the firmware to crash, disabling the wireless subsystem and interrupting network connectivity. The flaw lies in the driver’s lack of validation for the firmware’s advertised capabilities.

Affected Systems

Linux systems running a kernel version before the patch that contains this iwlwifi driver bug, using Intel wireless adapters that do not support 6E, including the AX201 device referenced in the description. Any distribution shipping the affected kernel will be vulnerable until updated.

Risk and Exploitability

No CVSS, EPSS or KEV metric is available for this vulnerability. The primary risk is a local denial‑of‑service that occurs when the driver attempts the unsupported command, resulting in a firmware crash. The attack vector is likely local and tied to the driver’s execution context; the exact conditions that trigger the crash are not detailed beyond the driver bug itself, so the likelihood of exploitation remains uncertain but the impact of a firmware crash is significant for device functionality.

Generated by OpenCVE AI on May 8, 2026 at 19:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that contains the iwlwifi patch to prevent sending unsupported 6E commands.
  • Reboot the system or reload the iwlwifi module so the updated driver takes effect.
  • Monitor system logs for firmware crash events (e.g., "iwlwifi: firmware error") to confirm that the issue has been resolved.

Generated by OpenCVE AI on May 8, 2026 at 19:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Fri, 08 May 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't send a 6E related command when not supported MCC_ALLOWED_AP_TYPE_CMD is related to 6E support. Do not send it if the device doesn't support 6E. Apparently, the firmware is mistakenly advertising support for this command even on AX201 which does not support 6E and then the firmware crashes.
Title wifi: iwlwifi: mvm: don't send a 6E related command when not supported
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:31:09.536Z

Reserved: 2026-05-01T14:12:56.002Z

Link: CVE-2026-43325

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:41.207

Modified: 2026-05-08T14:16:41.207

Link: CVE-2026-43325

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T21:45:18Z

Weaknesses