VYPR
High severity7.8NVD Advisory· Published Sep 19, 2025· Updated May 12, 2026

CVE-2025-39864

CVE-2025-39864

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: fix use-after-free in cmp_bss()

Following bss_free() quirk introduced in commit 776b3580178f ("cfg80211: track hidden SSID networks properly"), adjust cfg80211_update_known_bss() to free the last beacon frame elements only if they're not shared via the corresponding 'hidden_beacon_bss' pointer.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free vulnerability in the Linux kernel's cfg80211 subsystem, exploitable via crafted Wi-Fi frames, allows local privilege escalation.

Vulnerability

Overview

CVE-2025-39864 is a use-after-free vulnerability in the Linux kernel's cfg80211 wireless configuration subsystem. The bug resides in the cmp_bss() function, which is used to compare BSS (Basic Service Set) entries. The root cause is a quirk introduced in commit 776b3580178f ("cfg80211: track hidden SSID networks properly") that could lead to a use-after-free when cfg80211_update_known_bss() frees beacon frame elements that are still referenced via the hidden_beacon_bss pointer [1][3][4].

Exploitation

An attacker with a CVSS v3.1 base score of 7.8, the vulnerability is classified as High severity. The attack vector is local (AV:L), requires low complexity (AC:L), and no privileges (PR:N), but user interaction is required (UI:R). An attacker would need to send specially crafted Wi-Fi management frames to trigger the use-after-free condition. The vulnerability affects the Linux kernel and, by extension, products that incorporate it, such as Siemens SIMATIC CN 4100 devices running all versions before V5.0 [1].

Impact

Successful exploitation could allow an attacker to achieve arbitrary code execution in kernel context, leading to a complete compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). The use-after-free can be leveraged to corrupt kernel memory and potentially escalate privileges from a local user to root [1].

Mitigation

The fix is included in the Linux kernel stable releases, as referenced in commits a8bb681e879c and 5b7ae04969f [3][4]. Users should apply the latest kernel updates. For Siemens SIMATIC CN 4100, upgrading to version V5.0 or later addresses this vulnerability [1]. No workarounds are documented.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

1