VYPR
Unrated severityNVD Advisory· Published Oct 22, 2025· Updated Apr 15, 2026

CVE-2023-53715

CVE-2023-53715

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex

Apparently the hex passphrase mechanism does not work on newer chips/firmware (e.g. BCM4387). It seems there was a simple way of passing it in binary all along, so use that and avoid the hexification.

OpenBSD has been doing it like this from the beginning, so this should work on all chips.

Also clear the structure before setting the PMK. This was leaking uninitialized stack contents to the device.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's brcmfmac driver, a vulnerability allowed uninitialized stack data to be leaked to the device; fixed by passing PMK in binary and clearing the structure.

Vulnerability

Overview The brcmfmac WiFi driver in the Linux kernel mishandled PMK (Pairwise Master Key) passing by converting it to hex, which did not work on newer chips like BCM4387. Additionally, the structure was not cleared before setting the PMK, leading to leakage of uninitialized stack contents to the device.

Attack

Surface An attacker with local access or ability to trigger PMK configuration could exploit this information leak. The vulnerability is in the cfg80211 interface, so any user or process that can issue PMK-related commands could potentially trigger the leak.

Impact

The leak of uninitialized stack memory could expose sensitive kernel data to the device, potentially aiding in further exploitation.

Mitigation

The fix modifies the PMK handling to pass the key in binary form and clears the structure before use. This fix is applied in the stable kernel commits [1][2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.