CVE-2022-49238

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's ath11k Wi-Fi driver for Qualcomm QCA6390 and WCN6855 chipsets. When a station disconnects from an access point, improper peer cleanup leads to memory corruption that can cause kernel crashes or potential privilege escalation. Systems using affected Wi-Fi hardware with vulnerable kernel versions are at risk.

💻 Affected Systems

Products:
  • Linux kernel with ath11k driver
Versions: Kernel versions containing vulnerable ath11k driver commits up to fixes in stable releases
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Qualcomm QCA6390 or WCN6855 Wi-Fi chipsets. Requires ath11k driver usage.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential privilege escalation to kernel mode allowing full system compromise.

🟠

Likely Case

System instability, kernel crashes, or denial of service when Wi-Fi connections are established/disconnected.

🟢

If Mitigated

Minor performance impact or connection issues during Wi-Fi handoffs.

🌐 Internet-Facing: LOW - Requires local network access and specific Wi-Fi hardware.
🏢 Internal Only: MEDIUM - Internal attackers with network access could potentially trigger the vulnerability on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local network access and ability to trigger Wi-Fi connection/disconnection events. No public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel stable releases containing commits 212ad7cb7d7592669c067125949e0a8e31ce6a0b and 400705c50bbf184794c885d1efad7fe9ccf1471a

Vendor Advisory: https://git.kernel.org/stable/c/212ad7cb7d7592669c067125949e0a8e31ce6a0b

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable affected Wi-Fi hardware

Linux

Temporarily disable or blacklist ath11k driver to prevent use of vulnerable hardware

echo 'blacklist ath11k' >> /etc/modprobe.d/blacklist-ath11k.conf
modprobe -r ath11k
update-initramfs -u

🧯 If You Can't Patch

  • Disable Wi-Fi functionality on affected systems
  • Implement network segmentation to limit access to systems with vulnerable hardware

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if ath11k module is loaded: 'uname -r' and 'lsmod | grep ath11k'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check for KASAN warnings in dmesg: 'dmesg | grep -i kasan'

📡 Detection & Monitoring

Log Indicators:

  • KASAN use-after-free warnings in kernel logs
  • Kernel panic messages related to ath11k driver
  • Wi-Fi connection/disconnection anomalies

Network Indicators:

  • Unusual Wi-Fi disconnection patterns
  • Increased network errors on affected systems

SIEM Query:

source="kernel" AND ("KASAN" OR "use-after-free" OR "ath11k")

🔗 References

📤 Share & Export