CVE-2025-39864
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: fix use-after-free in cmp_bss()
Following bss_free() quirk introduced in commit 776b3580178f ("cfg80211: track hidden SSID networks properly"), adjust cfg80211_update_known_bss() to free the last beacon frame elements only if they're not shared via the corresponding 'hidden_beacon_bss' pointer.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free vulnerability in the Linux kernel's cfg80211 subsystem, exploitable via crafted Wi-Fi frames, allows local privilege escalation.
Vulnerability
Overview
CVE-2025-39864 is a use-after-free vulnerability in the Linux kernel's cfg80211 wireless configuration subsystem. The bug resides in the cmp_bss() function, which is used to compare BSS (Basic Service Set) entries. The root cause is a quirk introduced in commit 776b3580178f ("cfg80211: track hidden SSID networks properly") that could lead to a use-after-free when cfg80211_update_known_bss() frees beacon frame elements that are still referenced via the hidden_beacon_bss pointer [1][3][4].
Exploitation
An attacker with a CVSS v3.1 base score of 7.8, the vulnerability is classified as High severity. The attack vector is local (AV:L), requires low complexity (AC:L), and no privileges (PR:N), but user interaction is required (UI:R). An attacker would need to send specially crafted Wi-Fi management frames to trigger the use-after-free condition. The vulnerability affects the Linux kernel and, by extension, products that incorporate it, such as Siemens SIMATIC CN 4100 devices running all versions before V5.0 [1].
Impact
Successful exploitation could allow an attacker to achieve arbitrary code execution in kernel context, leading to a complete compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). The use-after-free can be leveraged to corrupt kernel memory and potentially escalate privileges from a local user to root [1].
Mitigation
The fix is included in the Linux kernel stable releases, as referenced in commits a8bb681e879c and 5b7ae04969f [3][4]. Users should apply the latest kernel updates. For Siemens SIMATIC CN 4100, upgrading to version V5.0 or later addresses this vulnerability [1]. No workarounds are documented.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Linux/Linuxv5Range: 5.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- git.kernel.org/stable/c/26e84445f02ce6b2fe5f3e0e28ff7add77f35e08nvdPatch
- git.kernel.org/stable/c/5b7ae04969f822283a95c866967e42b4d75e0eefnvdPatch
- git.kernel.org/stable/c/6854476d9e1aeaaf05ebc98d610061c2075db07dnvdPatch
- git.kernel.org/stable/c/912c4b66bef713a20775cfbf3b5e9bd71525c716nvdPatch
- git.kernel.org/stable/c/a8bb681e879ca3c9f722aa08d3d7ae41c42a8807nvdPatch
- git.kernel.org/stable/c/a97a9791e455bb0cd5e7a38b5abcb05523d4e21cnvdPatch
- git.kernel.org/stable/c/b7d08929178c16398278613df07ad65cf63cce9dnvdPatch
- git.kernel.org/stable/c/ff040562c10a540b8d851f7f4145fa112977f853nvdPatch
- lists.debian.org/debian-lts-announce/2025/10/msg00007.htmlnvdMailing ListThird Party Advisory
- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdMailing ListThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-032379.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-089022.htmlnvd
News mentions
1- Siemens SIMATICCISA ICS Advisories