The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-71229

CVE-2025-71229: Linux Kernel Buffer Overflow Vulnerability

CVE-2025-71229 is a buffer overflow flaw in the Linux kernel's rtw88 WiFi driver that causes alignment faults and system crashes. This post explains its technical details, affected versions, impact, and mitigation.

Published: February 20, 2026

CVE-2025-71229 Overview

CVE-2025-71229 is a memory alignment fault vulnerability in the Linux kernel's rtw88 WiFi driver, specifically within the rtw_core_enable_beacon() function. The vulnerability occurs when the function attempts to read 4 bytes from a memory address that is not aligned to a 4-byte boundary, resulting in a kernel crash on systems with strict alignment requirements.

This vulnerability affects systems using Realtek 802.11ac wireless chips with the rtw88 driver, particularly ARM64-based platforms that enforce strict memory alignment. The fault triggers during WiFi hardware scan operations when processing channel switch commands from firmware.

Critical Impact

Exploitation of this vulnerability leads to immediate kernel panic and system crash, causing denial of service conditions on affected Linux systems running rtw88 WiFi drivers.

Affected Products

  • Linux kernel with rtw88 WiFi driver (rtw88_core, rtw88_pci modules)
  • Realtek RTW88 series wireless adapters (including RTW8822CE)
  • ARM64-based systems with strict memory alignment enforcement

Discovery Timeline

  • 2026-02-18 - CVE CVE-2025-71229 published to NVD
  • 2026-02-18 - Last updated in NVD database

Technical Details for CVE-2025-71229

Vulnerability Analysis

The vulnerability exists in the rtw_core_enable_beacon() function within the rtw88 WiFi driver subsystem. The function performs a 4-byte read operation via rtw_pci_read32() on an address (0xffff8000827e0522) that is not aligned to a 4-byte boundary. On ARM64 processors and other architectures that enforce strict memory alignment, this misaligned memory access triggers a Data Abort exception with an alignment fault (FSC = 0x21).

The crash occurs in the context of the rtw_c2h_work workqueue when processing Command-to-Host (C2H) messages from the WiFi firmware. The call chain shows the fault propagating through rtw_fw_c2h_cmd_handle() → rtw_hw_scan_chan_switch() → rtw_core_enable_beacon() → rtw_pci_read32().

Root Cause

The root cause is an improper assumption about memory alignment in the rtw88 driver's beacon handling code. The rtw_core_enable_beacon() function directly passes a pointer to rtw_pci_read32() without ensuring the address is 4-byte aligned. On x86 platforms, unaligned memory accesses are handled transparently by the processor with a performance penalty. However, ARM64 and other RISC architectures generate hardware exceptions for misaligned accesses.

The error signature ESR = 0x0000000096000021 indicates an Exception Syndrome Register value corresponding to a Data Abort (EC = 0x25) with an alignment fault status code (FSC = 0x21), confirming the memory alignment violation.

Attack Vector

This vulnerability is triggered locally during normal WiFi operations, specifically during hardware scan procedures when the driver processes beacon-related firmware commands. While the attack vector requires local access to a system with the vulnerable driver, the following conditions can trigger the crash:

  • Initiating WiFi scans on systems with rtw88-supported wireless adapters
  • Processing C2H firmware commands during channel switching operations
  • Any operation that invokes rtw_core_enable_beacon() with misaligned buffer addresses

The fix replaces the 4-byte read/write operations with individual 1-byte operations that do not require alignment, eliminating the alignment fault condition entirely.

Detection Methods for CVE-2025-71229

Indicators of Compromise

  • Kernel panic messages containing rtw_pci_read32 in the call trace
  • System crashes with error signature ESR = 0x0000000096000021 indicating alignment faults
  • Oops messages referencing rtw88_core, rtw88_pci, or rtw_core_enable_beacon modules
  • Workqueue crashes in phy0 rtw_c2h_work context

Detection Strategies

  • Monitor kernel logs for alignment fault exceptions (FSC = 0x21) associated with WiFi driver operations
  • Check for recurring system crashes on ARM64 systems during WiFi scan operations
  • Review dmesg output for Internal error: Oops: 0000000096000021 entries
  • Audit loaded kernel modules for vulnerable rtw88 driver versions

Monitoring Recommendations

  • Enable kernel crash dump collection (kdump) to capture forensic data on affected systems
  • Configure log aggregation to alert on kernel panic events involving rtw88 modules
  • Monitor system uptime metrics for unexpected reboots on systems with Realtek WiFi adapters
  • Implement watchdog timers to detect and report system hangs during WiFi operations

How to Mitigate CVE-2025-71229

Immediate Actions Required

  • Update the Linux kernel to a patched version containing the alignment fault fix
  • If immediate patching is not possible, consider temporarily disabling the rtw88 WiFi driver
  • Use alternative WiFi adapters with different driver implementations on critical systems
  • Monitor affected systems for unexpected crashes during WiFi operations

Patch Information

The Linux kernel maintainers have released patches to address this vulnerability. The fix modifies rtw_core_enable_beacon() to perform byte-by-byte memory operations instead of 4-byte accesses, eliminating the alignment requirement. Multiple kernel stable branches have received backported fixes:

  • Kernel Patch 13394550
  • Kernel Patch 653f8b6a
  • Kernel Patch 71dee09
  • Kernel Patch 7d31dde1

Workarounds

  • Blacklist the rtw88 driver modules (rtw88_core, rtw88_pci, rtw88_8822c, rtw88_8822ce) if WiFi functionality is not required
  • Use USB WiFi adapters with alternative driver support as a temporary solution
  • On affected ARM64 systems, consider using wired Ethernet connections until patched kernels are deployed
  • Apply kernel live patching solutions if available for your distribution
bash
# Configuration example
# Blacklist rtw88 driver modules to prevent loading
echo "blacklist rtw88_core" >> /etc/modprobe.d/blacklist-rtw88.conf
echo "blacklist rtw88_pci" >> /etc/modprobe.d/blacklist-rtw88.conf
echo "blacklist rtw88_8822c" >> /etc/modprobe.d/blacklist-rtw88.conf
echo "blacklist rtw88_8822ce" >> /etc/modprobe.d/blacklist-rtw88.conf

# Unload currently loaded modules (if system is stable)
modprobe -r rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core

# Update initramfs to persist changes
update-initramfs -u

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Patch 13394550

  • Kernel Patch 653f8b6a

  • Kernel Patch 71dee09

  • Kernel Patch 7d31dde1
  • Related CVEs
  • CVE-2026-23448: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-23447: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31395: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31402: Linux Kernel Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English