Linux developers are already aware of the vulnerability affecting the Realtek driver (RTLWIFI) that allows attacking devices over a Wi-Fi connection, and a fix has to be incorporated into the operating system kernel in the short term. «The bug is serious. It is a vulnerability that triggers data over-the-air remotely over Wi-Fi in the Linux kernel if we are using the Realtek driver, ”said Nit Waisman, lead security engineer at GitHub. ArsTechnica.
Attacks that exploit this vulnerability to execute malicious code on a vulnerable machine have not yet been identified. Waisman says that 'in theory, this flaw is exploitable. In the worst case scenario, it will be a denial of service.
Driver failure can be exploited when an affected device is within range of radio signals from a malicious device. If Wi-Fi is on, no end-user interaction is required to trigger exploitation. Notice of Absence functionality, built into the Wi-Fi Direct standard that allows two Wi-Fi devices to connect, is one entry into this vulnerability.
If Wi-Fi is turned off, or the controller is not from Realtek, the fault cannot be exploited. While there is still no evidence of attacks, the possibility of malicious code being injected that can be done only by being within the reach of devices controlled by malicious agents requires caution.