CVE-2026-43110

high

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: validate bsscfg indices in IF events brcmf_fweh_handle_if_event() validates the firmware-provided interface index before it touches drvr->iflist[], but it still uses the raw bsscfgidx field as an array index without a matching range check. Reject IF events whose bsscfg index does not fit in drvr->iflist[] before indexing the interface array. [add missing wifi prefix]

References

https://git.kernel.org/stable/c/b427c2b05222db36d32ee141609de6128e9091bb

https://git.kernel.org/stable/c/9fca68c2512a362cad258e4df12a307bb2ee4b8e

https://git.kernel.org/stable/c/3ec7437e9d11374105c2c4e47ae671537729d7e6

https://git.kernel.org/stable/c/304950a467d83678bd0b0f46331882e2ac23b12d

https://git.kernel.org/stable/c/1ae1e1caa428844e481231f6dbe9b4f475f1d52d

Details

Source: Mitre, NVD

Published: 2026-05-06

Updated: 2026-05-06

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:P/A:C

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018