CVE-2022-49471

7.8 HIGH

📋 TL;DR

This CVE describes an array index out-of-bounds vulnerability in the Linux kernel's rtw89 Wi-Fi driver. The vulnerability allows hardware to report incorrect mac_id values, potentially leading to memory corruption. Systems using affected Linux kernel versions with rtw89 driver support are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with rtw89 Wi-Fi driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with rtw89 Wi-Fi hardware (Realtek 8852AE/8852BE/8852CE chipsets). Requires the rtw89 driver to be loaded and active.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory corruption leading to system crash, denial of service, or potential privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System instability, kernel panics, or denial of service affecting Wi-Fi functionality on devices using rtw89 drivers.

🟢

If Mitigated

Minor performance impact from bounds checking with no security consequences.

🌐 Internet-Facing: LOW - Requires local access to Wi-Fi hardware and driver interaction.
🏢 Internal Only: MEDIUM - Local attackers with access to Wi-Fi hardware could potentially trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to trigger the hardware condition that causes incorrect mac_id reporting. No public exploits are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 03ed236480ae, 97df85871a5b, or c32fafe68298 applied

Vendor Advisory: https://git.kernel.org/stable/c/03ed236480aeec8c2fd327a1ea6d711364c495e3

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable rtw89 driver

Linux

Blacklist or disable the rtw89 kernel module to prevent loading

echo 'blacklist rtw89_core' | sudo tee /etc/modprobe.d/blacklist-rtw89.conf
sudo rmmod rtw89_core rtw89_pci
sudo update-initramfs -u

🧯 If You Can't Patch

  • Disable Wi-Fi functionality on affected systems
  • Use alternative Wi-Fi hardware not requiring rtw89 driver

🔍 How to Verify

Check if Vulnerable:

Check if rtw89 driver is loaded: lsmod | grep rtw89. Check kernel version against distribution security advisories.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and rtw89 driver loads without errors in dmesg.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • UBSAN array-index-out-of-bounds errors in dmesg
  • rtw89 driver crash logs

Network Indicators:

  • Wi-Fi connectivity issues on affected hardware

SIEM Query:

kernel: *UBSAN*array-index-out-of-bounds*rtw89* OR kernel: *rtw89*panic*

🔗 References

📤 Share & Export