CVE-2022-48918

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's iwlwifi driver allows local attackers to cause a kernel panic (denial of service) when debugfs is disabled. This affects systems using Intel Wi-Fi hardware with the iwlwifi driver loaded. The vulnerability requires local access to trigger.

💻 Affected Systems

Products:
  • Linux kernel iwlwifi driver (iwlmvm module)
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when debugfs is disabled via kernel command line parameter 'debugfs=off' and iwlwifi driver is loaded.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to load/unload kernel modules or trigger driver initialization with debugfs disabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 5a6248c0a22352f09ea041665d3bd3e18f6f872c, 7de1ed755e1ace30d97a724bad32452ed86b653b, fe51975ff13831e794e1bcd0039b305dcad3d7ba

Vendor Advisory: https://git.kernel.org/stable/c/5a6248c0a22352f09ea041665d3bd3e18f6f872c

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Reboot system. 3. Verify kernel version with 'uname -r'.

🔧 Temporary Workarounds

Enable debugfs

linux

Remove 'debugfs=off' from kernel command line parameters

Edit /etc/default/grub or bootloader config, remove 'debugfs=off' from GRUB_CMDLINE_LINUX
Run 'update-grub' (Debian/Ubuntu) or 'grub2-mkconfig' (RHEL/Fedora)
Reboot

Blacklist iwlwifi module

linux

Prevent loading of vulnerable driver if Wi-Fi not needed

echo 'blacklist iwlwifi' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u (or dracut --force)
Reboot

🧯 If You Can't Patch

  • Ensure debugfs is enabled (default setting)
  • Restrict local user access to systems with vulnerable configuration

🔍 How to Verify

Check if Vulnerable:

Check if 'debugfs=off' is in kernel cmdline: cat /proc/cmdline | grep debugfs=off AND check if iwlwifi module is loaded: lsmod | grep iwlwifi

Check Version:

uname -r

Verify Fix Applied:

Check kernel version is patched: uname -r should show version after fix commits were merged

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic/Oops messages mentioning iwl_mvm_dbgfs_register
  • NULL pointer dereference at address 000000000000004f
  • System crash/reboot events

Network Indicators:

  • None - local vulnerability only

SIEM Query:

kernel: "BUG: kernel NULL pointer dereference" AND "iwl_mvm_dbgfs_register" OR "CR2: 000000000000004f"

🔗 References

📤 Share & Export