Description
The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
References (3)
Core 3
Core References
Exploit, Third Party Advisory x_refsource_misc
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
Third Party Advisory, US Government Resource x_refsource_misc
https://kb.cert.org/vuls/id/166939/
Patch, Third Party Advisory x_refsource_misc
https://git.kernel.org/linus/1b5e2423164b3670e8bc9174e4762d297990deff
Scores
CVSS v3
7.9
EPSS
0.0293
EPSS Percentile
86.5%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Details
CWE
CWE-122
CWE-787
Status
published
Products (2)
broadcom/brcmfmac_driver
linux/linux_kernel
4.5 - 4.9.181
Published
Jan 16, 2020
Tracked Since
Feb 18, 2026