Impact
The iwlwifi driver in the Linux kernel mistakenly sends a 6E capability command (MCC_ALLOWED_AP_TYPE_CMD) even when the underlying firmware does not advertise support for 6E. This incorrect command invocation causes the firmware to crash, disabling the wireless subsystem and interrupting network connectivity. The flaw lies in the driver’s lack of validation for the firmware’s advertised capabilities.
Affected Systems
Linux systems running a kernel version before the patch that contains this iwlwifi driver bug, using Intel wireless adapters that do not support 6E, including the AX201 device referenced in the description. Any distribution shipping the affected kernel will be vulnerable until updated.
Risk and Exploitability
No CVSS, EPSS or KEV metric is available for this vulnerability. The primary risk is a local denial‑of‑service that occurs when the driver attempts the unsupported command, resulting in a firmware crash. The attack vector is likely local and tied to the driver’s execution context; the exact conditions that trigger the crash are not detailed beyond the driver bug itself, so the likelihood of exploitation remains uncertain but the impact of a firmware crash is significant for device functionality.
OpenCVE Enrichment