
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's ath12k WiFi driver was discovered and assigned CVE-2025-38291. The issue was disclosed on July 10, 2025, affecting the kernel's handling of WMI commands during firmware crash recovery. The vulnerability specifically impacts the QCN9274 hw2.0 PCI WLAN hardware running WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1 firmware (NVD).
The vulnerability occurs when the host sends WMI commands to the firmware while it is in recovery mode after a crash. This results in command failures and generates kernel call traces. The technical issue stems from improper handling of the firmware recovery state, where the host continues to send commands despite the firmware being in an unstable state (NVD).
When exploited, this vulnerability causes kernel call traces and potential system instability. The issue affects the WiFi functionality of systems using the ath12k driver, particularly during firmware crash recovery scenarios (NVD).
The fix involves setting the ATH12KFLAGCRASHFLUSH and ATH12KFLAG_RECOVERY flags when the host driver receives the firmware crash notification from MHI. This prevents the sending of WMI commands to the firmware during the recovery process (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."