{"api_version":"1","generated_at":"2026-05-08T18:02:01+00:00","cve":"CVE-2026-43325","urls":{"html":"https://cve.report/CVE-2026-43325","api":"https://cve.report/api/cve/CVE-2026-43325.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43325","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43325"},"summary":{"title":"wifi: iwlwifi: mvm: don't send a 6E related command when not supported","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don't send a 6E related command when not supported\n\nMCC_ALLOWED_AP_TYPE_CMD is related to 6E support. Do not send it if the\ndevice doesn't support 6E.\nApparently, the firmware is mistakenly advertising support for this\ncommand even on AX201 which does not support 6E and then the firmware\ncrashes.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-08 14:16:41","updated_at":"2026-05-08 14:16:41"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/323156c3541e23da7e582008a7ac30cd51b60acd","name":"https://git.kernel.org/stable/c/323156c3541e23da7e582008a7ac30cd51b60acd","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/c0b3fa5e0eaecd38e6a9f8f78e86f468fbde719a","name":"https://git.kernel.org/stable/c/c0b3fa5e0eaecd38e6a9f8f78e86f468fbde719a","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/6607d0e58ceca997816122568ce54db9e134edab","name":"https://git.kernel.org/stable/c/6607d0e58ceca997816122568ce54db9e134edab","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43325","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43325","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0d2fc8821a7d667180ce27732697105db843a1b9 c0b3fa5e0eaecd38e6a9f8f78e86f468fbde719a git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0d2fc8821a7d667180ce27732697105db843a1b9 6607d0e58ceca997816122568ce54db9e134edab git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0d2fc8821a7d667180ce27732697105db843a1b9 323156c3541e23da7e582008a7ac30cd51b60acd git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.9","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.9 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.22 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.12 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/net/wireless/intel/iwlwifi/mvm/fw.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"c0b3fa5e0eaecd38e6a9f8f78e86f468fbde719a","status":"affected","version":"0d2fc8821a7d667180ce27732697105db843a1b9","versionType":"git"},{"lessThan":"6607d0e58ceca997816122568ce54db9e134edab","status":"affected","version":"0d2fc8821a7d667180ce27732697105db843a1b9","versionType":"git"},{"lessThan":"323156c3541e23da7e582008a7ac30cd51b60acd","status":"affected","version":"0d2fc8821a7d667180ce27732697105db843a1b9","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/net/wireless/intel/iwlwifi/mvm/fw.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.9"},{"lessThan":"6.9","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.22","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.12","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.22","versionStartIncluding":"6.9","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.12","versionStartIncluding":"6.9","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.9","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don't send a 6E related command when not supported\n\nMCC_ALLOWED_AP_TYPE_CMD is related to 6E support. Do not send it if the\ndevice doesn't support 6E.\nApparently, the firmware is mistakenly advertising support for this\ncommand even on AX201 which does not support 6E and then the firmware\ncrashes."}],"providerMetadata":{"dateUpdated":"2026-05-08T13:31:09.536Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/c0b3fa5e0eaecd38e6a9f8f78e86f468fbde719a"},{"url":"https://git.kernel.org/stable/c/6607d0e58ceca997816122568ce54db9e134edab"},{"url":"https://git.kernel.org/stable/c/323156c3541e23da7e582008a7ac30cd51b60acd"}],"title":"wifi: iwlwifi: mvm: don't send a 6E related command when not supported","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43325","datePublished":"2026-05-08T13:31:09.536Z","dateReserved":"2026-05-01T14:12:56.002Z","dateUpdated":"2026-05-08T13:31:09.536Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 14:16:41","lastModifiedDate":"2026-05-08 14:16:41","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43325","Ordinal":"1","Title":"wifi: iwlwifi: mvm: don't send a 6E related command when not sup","CVE":"CVE-2026-43325","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43325","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don't send a 6E related command when not supported\n\nMCC_ALLOWED_AP_TYPE_CMD is related to 6E support. Do not send it if the\ndevice doesn't support 6E.\nApparently, the firmware is mistakenly advertising support for this\ncommand even on AX201 which does not support 6E and then the firmware\ncrashes.","Type":"Description","Title":"wifi: iwlwifi: mvm: don't send a 6E related command when not sup"}]}}}