
Cloud Vulnerability DB
A community-led vulnerabilities database
A null pointer dereference vulnerability was discovered in the Linux kernel's WiFi driver component (mt76/mt7921), identified as CVE-2025-22032. The vulnerability was disclosed on April 16, 2025, affecting the mt792xrxget_wcid function in the Linux kernel's MediaTek MT7921 WiFi driver. The issue occurs because the deflink structure is not properly initialized with the sta context (NVD).
The vulnerability manifests as a kernel panic caused by a null pointer dereference in the mt792xrxget_wcid function. The issue stems from improper initialization of the deflink structure with the sta context. Red Hat has assigned this vulnerability a CVSS v3.1 Base Score of 5.5 (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H), indicating moderate severity (Red Hat).
When exploited, this vulnerability results in a kernel panic, causing system instability and potential denial of service. The impact is primarily focused on system availability, with no direct effect on confidentiality or integrity (Red Hat).
The vulnerability has been fixed in various Linux kernel versions. Debian has addressed this in version 6.12.25-1 for sid, while some distributions like Red Hat Enterprise Linux 6, 7, 8, and 9 are not affected by this vulnerability (Debian Tracker, Red Hat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."