Cyber Posture

CVE-2024-58015

High

Published: 27 February 2025

Published
27 February 2025
Modified
22 October 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0001 1.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-58015 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 1.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

preventrecover

Directly requires timely remediation of the out-of-bounds access flaw in the ath12k WiFi driver by applying the available kernel patches.

detect

Enables vulnerability scanning to identify systems running kernel versions affected by CVE-2024-58015's out-of-bounds read vulnerability.

prevent

Implements kernel memory protections such as randomization and restrictions that mitigate information disclosure and corruption from the out-of-bounds access.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

OOB kernel memory read enables local sensitive data access (T1005); memory corruption enables targeted DoS (T1499.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in…

more

possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758

Deeper analysisAI

CVE-2024-58015 is an out-of-bounds access vulnerability in the Linux kernel's ath12k WiFi driver. The issue arises when selfgen statistics are copied into a buffer using the print_array_to_buf_index() function, where the array length parameter exceeds the actual buffer size, potentially leading to an out-of-bounds memory read (CWE-125). This flaw was identified through Coverity static analysis scans (CID 1600742 and CID 1600758). The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H), rated as High severity.

A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows the attacker to read sensitive data from kernel memory (high confidentiality impact) and potentially cause a denial of service through memory corruption (high availability impact), though integrity impact is none.

The provided kernel patch commits mitigate the issue by reducing the buffer size by one, correcting the faulty upper bound of the passed array. Relevant fixes are available at https://git.kernel.org/stable/c/8700c4bf8b7ed98037d2acf1eaf770ad6dd431d4 and https://git.kernel.org/stable/c/eb8c0534713865d190856f10bfc97cf0b88475b1; security practitioners should ensure affected Linux kernels are updated to include these changes.

Details

CWE(s)

Affected Products

linux
linux kernel
6.3 — 6.13.3

CVEs Like This One

CVE-2025-71231Same product: Linux Linux Kernel
CVE-2024-52332Same product: Linux Linux Kernel
CVE-2025-71093Same product: Linux Linux Kernel
CVE-2026-23397Same product: Linux Linux Kernel
CVE-2025-21742Same product: Linux Linux Kernel
CVE-2024-58007Same product: Linux Linux Kernel
CVE-2025-71133Same product: Linux Linux Kernel
CVE-2025-21789Same product: Linux Linux Kernel
CVE-2026-23187Same product: Linux Linux Kernel
CVE-2026-23315Same product: Linux Linux Kernel

References