CVE-2022-50165

5.5 MEDIUM

📋 TL;DR

This CVE-2022-50165 is an uninitialized variable vulnerability in the Linux kernel's wil6210 WiFi driver debugfs interface. It could allow local attackers to cause kernel memory corruption or information disclosure by writing to debugfs files. Systems using Qualcomm Atheros QCA6174 WiFi chips with the wil6210 driver are affected.

💻 Affected Systems

Products:
  • Linux kernel with wil6210 driver
Versions: Linux kernel versions with commit 7a4836560a61 up to patched versions
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if debugfs is mounted and accessible to local users. Typically requires root or privileged access to debugfs.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel mode, system crash, or kernel memory information disclosure

🟠

Likely Case

Kernel panic causing denial of service or limited information disclosure

🟢

If Mitigated

No impact if debugfs is disabled or access restricted

🌐 Internet-Facing: LOW - Requires local access to debugfs interface
🏢 Internal Only: MEDIUM - Local users could exploit if they have debugfs access

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to write to debugfs. Exploitation depends on how uninitialized variable is used.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in stable kernel versions via provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/409bd72e544fdf4809ea0dac337bb5a1f11a25a9

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system. 3. Verify kernel version is updated.

🔧 Temporary Workarounds

Disable debugfs access

linux

Prevent non-root users from accessing debugfs which contains the vulnerable interface

mount -o remount,nodev,noexec,nosuid /sys/kernel/debug
chmod 700 /sys/kernel/debug

Unmount debugfs

linux

Completely unmount debugfs filesystem if not needed

umount /sys/kernel/debug

🧯 If You Can't Patch

  • Restrict debugfs access to root only using mount options and permissions
  • Disable wil6210 driver if not needed or use alternative WiFi hardware

🔍 How to Verify

Check if Vulnerable:

Check if debugfs is mounted and accessible, and kernel version is within affected range

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond vulnerable commits and debugfs access is restricted

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crashes related to wil6210 driver
  • Permission denied errors for debugfs access attempts

Network Indicators:

  • Unusual local process accessing /sys/kernel/debug/wil6210 files

SIEM Query:

process.name:cat AND file.path:/sys/kernel/debug/wil6210/* OR kernel.panic OR kernel.oops

🔗 References

📤 Share & Export