CVE-2025-38512
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/08/2025
Last modified:
07/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: prevent A-MSDU attacks in mesh networks<br />
<br />
This patch is a mitigation to prevent the A-MSDU spoofing vulnerability<br />
for mesh networks. The initial update to the IEEE 802.11 standard, in<br />
response to the FragAttacks, missed this case (CVE-2025-27558). It can<br />
be considered a variant of CVE-2020-24588 but for mesh networks.<br />
<br />
This patch tries to detect if a standard MSDU was turned into an A-MSDU<br />
by an adversary. This is done by parsing a received A-MSDU as a standard<br />
MSDU, calculating the length of the Mesh Control header, and seeing if<br />
the 6 bytes after this header equal the start of an rfc1042 header. If<br />
equal, this is a strong indication of an ongoing attack attempt.<br />
<br />
This defense was tested with mac80211_hwsim against a mesh network that<br />
uses an empty Mesh Address Extension field, i.e., when four addresses<br />
are used, and when using a 12-byte Mesh Address Extension field, i.e.,<br />
when six addresses are used. Functionality of normal MSDUs and A-MSDUs<br />
was also tested, and confirmed working, when using both an empty and<br />
12-byte Mesh Address Extension field.<br />
<br />
It was also tested with mac80211_hwsim that A-MSDU attacks in non-mesh<br />
networks keep being detected and prevented.<br />
<br />
Note that the vulnerability being patched, and the defense being<br />
implemented, was also discussed in the following paper and in the<br />
following IEEE 802.11 presentation:<br />
<br />
https://papers.mathyvanhoef.com/wisec2025.pdf<br />
https://mentor.ieee.org/802.11/dcn/25/11-25-0949-00-000m-a-msdu-mesh-spoof-protection.docx
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.107 (including) | 6.1.146 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3 (including) | 6.6.99 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/6e3b09402cc6c3e3474fa548e8adf6897dda05de
- https://git.kernel.org/stable/c/737bb912ebbe4571195c56eba557c4d7315b26fb
- https://git.kernel.org/stable/c/e01851f6e9a665a6011b14714b271d3e6b0b8d32
- https://git.kernel.org/stable/c/e2c8a3c0388aef6bfc4aabfba07bc7dff16eea80
- https://git.kernel.org/stable/c/ec6392061de6681148b63ee6c8744da833498cdd
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



