The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31780

CVE-2026-31780: Linux Kernel Buffer Overflow Vulnerability

CVE-2026-31780 is a buffer overflow vulnerability in the Linux kernel's wilc1000 WiFi driver that causes heap corruption during SSID scanning. This article covers the technical details, affected versions, and mitigation.

Published: May 7, 2026

CVE-2026-31780 Overview

CVE-2026-31780 is a heap buffer overflow vulnerability in the Linux kernel's wilc1000 WiFi driver. The flaw resides in the SSID scan buffer size calculation, where the valuesize variable is declared as u8 but accumulates the total length of all SSIDs to scan. With WILC_MAX_NUM_PROBED_SSID set to 10 and each SSID contributing up to 33 bytes (IEEE80211_MAX_SSID_LEN + 1), the total can reach 330 bytes. This wraps around to 74 when stored in a u8, causing kmalloc to allocate only 75 bytes while the subsequent memcpy writes up to 331 bytes, producing a 256-byte heap buffer overflow.

Critical Impact

Local attackers with low privileges can trigger memory corruption in kernel space, potentially leading to privilege escalation, kernel code execution, or system crash.

Affected Products

  • Linux kernel versions containing the wilc1000 WiFi driver prior to the patched commits
  • Systems using Microchip WILC1000 IEEE 802.11 b/g/n wireless devices
  • Embedded and IoT distributions shipping the affected kernel branches

Discovery Timeline

  • 2026-05-01 - CVE-2026-31780 published to NVD
  • 2026-05-03 - Last updated in NVD database

Technical Details for CVE-2026-31780

Vulnerability Analysis

The vulnerability is a classic integer truncation leading to a heap buffer overflow in the wilc1000 wireless driver. The driver iterates over a list of SSIDs to probe during a scan and accumulates the cumulative byte length into the valuesize variable. Because valuesize is typed as an unsigned 8-bit integer, any cumulative length exceeding 255 wraps around modulo 256.

When the maximum supported probed SSID count (WILC_MAX_NUM_PROBED_SSID = 10) is requested with full-length SSIDs, the true byte count reaches 330. The truncated value of 74 is then passed to kmalloc, which returns a 75-byte allocation. The driver subsequently copies the untruncated full-length data via memcpy, writing up to 331 bytes into the 75-byte allocation and overflowing 256 bytes into adjacent kernel heap memory.

Root Cause

The root cause is a numeric truncation error caused by an undersized integer type. The u8 declaration of valuesize cannot represent the maximum cumulative SSID length the function is expected to handle. The fix widens valuesize from u8 to u32, allowing the variable to hold the full possible range of cumulative SSID lengths without wrapping.

Attack Vector

Exploitation requires local access with the ability to issue scan-related operations to the wilc1000 driver, typically via standard nl80211 or wireless extension interfaces accessible to processes with CAP_NET_ADMIN. An attacker constructs a scan request specifying multiple long SSIDs that cause the cumulative length to exceed 255 bytes. The resulting heap overflow corrupts adjacent slab objects and can be shaped into kernel memory disclosure, privilege escalation, or denial of service.

No public proof-of-concept exploit is available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The patch is distributed across multiple stable kernel branches via commits including 549f02d8 and d8388614.

Detection Methods for CVE-2026-31780

Indicators of Compromise

  • Kernel oops or panic messages referencing wilc1000, kmalloc, or slab corruption following a wireless scan operation
  • KASAN reports identifying out-of-bounds writes in the wilc1000 SSID scan path
  • Unexpected wireless interface resets or driver reload events correlated with scan requests containing many or oversized SSIDs

Detection Strategies

  • Audit kernel versions deployed across endpoints and embedded devices to identify systems running pre-patch wilc1000 driver builds.
  • Monitor dmesg and syslog for slab corruption messages, KASAN warnings, or general protection faults occurring during wireless scanning.
  • Inspect nl80211 scan requests for unusually large SSID lists that approach WILC_MAX_NUM_PROBED_SSID with maximum-length SSIDs.

Monitoring Recommendations

  • Forward kernel ring buffer logs to a centralized SIEM and alert on wilc1000 driver crashes or recovery events.
  • Track process activity invoking iw, iwlist, or custom nl80211 clients with elevated network capabilities.
  • Correlate user-space wireless tooling execution with kernel anomalies on devices using Microchip WILC1000 hardware.

How to Mitigate CVE-2026-31780

Immediate Actions Required

  • Apply the upstream Linux kernel patch that widens valuesize from u8 to u32 in the wilc1000 SSID scan buffer calculation.
  • Update to a stable kernel release that incorporates the fix; references include the kernel.org commit 549f02d8 and commit d8388614.
  • Restrict CAP_NET_ADMIN and wireless configuration privileges to trusted users only on systems using the WILC1000 driver.

Patch Information

The fix is available in the upstream Linux kernel via multiple stable branch commits, including 0c7f21d8, 34a23fd9, 549f02d8, 9907ac9b, bfbddead, c97b2a00, d049e56b, and d8388614. Distribution maintainers should rebase to a kernel containing these commits.

Workarounds

  • Unload the wilc1000 kernel module on systems that do not require WILC1000 wireless functionality using modprobe -r wilc1000 and blacklist it.
  • Limit scan operations on affected devices to trusted system services and prevent unprivileged users from issuing arbitrary nl80211 scan requests.
  • Constrain the number and length of probed SSIDs in user-space wireless management tools until the kernel patch is deployed.
bash
# Configuration example: blacklist the vulnerable driver until patched
echo "blacklist wilc1000" | sudo tee /etc/modprobe.d/wilc1000-cve-2026-31780.conf
sudo modprobe -r wilc1000_sdio wilc1000_spi wilc1000
sudo update-initramfs -u

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • Technical References
  • Kernel Git Commit Update 1

  • Kernel Git Commit Update 2

  • Kernel Git Commit Update 3

  • Kernel Git Commit Update 4

  • Kernel Git Commit Update 5

  • Kernel Git Commit Update 6

  • Kernel Git Commit Update 7

  • Kernel Git Commit Update 8
  • Related CVEs
  • CVE-2026-31743: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-43051: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31742: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31774: Linux Kernel Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English