CVE-2022-48938

5.5 MEDIUM

📋 TL;DR

This CVE describes an integer overflow vulnerability in the Linux kernel's CDC-NCM network driver. A malicious or broken USB device could trigger this overflow during packet processing, potentially causing kernel crashes or denial of service. Systems using affected Linux kernel versions with CDC-NCM enabled are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires CDC-NCM driver to be loaded/used (common for USB network adapters). Most distributions have this enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical access to restart the system.

🟠

Likely Case

System instability, kernel crashes, or denial of service when connecting malicious USB network devices.

🟢

If Mitigated

Minor performance impact or connection issues with specific USB network devices.

🌐 Internet-Facing: LOW - Requires physical USB device connection or USB-over-IP access.
🏢 Internal Only: MEDIUM - Internal attackers with physical access or USB device sharing capabilities could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires physical USB device access or USB-over-IP capability. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the fix commits (e.g., 5.15.90+, 5.19.17+, 6.0.15+, 6.1.1+)

Vendor Advisory: https://git.kernel.org/stable/c/49909c9f8458cacb5b241106cba65aba5a6d8f4c

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version via distribution package manager. 2. For custom kernels, apply the fix commits from kernel.org. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable CDC-NCM module

linux

Prevent loading of vulnerable kernel module

echo 'blacklist cdc_ncm' >> /etc/modprobe.d/blacklist-cdc-ncm.conf
rmmod cdc_ncm

Restrict USB device access

all

Limit physical USB port access to trusted devices only

🧯 If You Can't Patch

  • Implement strict physical security controls for USB ports
  • Disable USB network device functionality where not required

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if cdc_ncm module is loaded: 'uname -r' and 'lsmod | grep cdc_ncm'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and test with USB network device functionality

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System crash dumps
  • CDC-NCM driver error messages in dmesg

Network Indicators:

  • Sudden loss of USB network connectivity
  • Unusual USB device connection patterns

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "cdc_ncm")

🔗 References

📤 Share & Export