CVE-2022-50178

5.5 MEDIUM

📋 TL;DR

A division-by-zero vulnerability in the Linux kernel's rtw89 WiFi driver for Realtek 8852A chipsets can cause kernel panics when processing certain RF calibration results. This affects Linux systems using vulnerable WiFi hardware and drivers, potentially causing denial of service during WiFi connection establishment.

💻 Affected Systems

Products:
  • Linux kernel with rtw89 driver
Versions: Linux kernel versions with vulnerable rtw89 driver code (specific versions not explicitly stated, but fix commits target stable branches)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Realtek 8852A WiFi hardware and rtw89 driver usage. Triggered during WiFi connection establishment (wpa_supplicant shown in stack trace).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, requiring physical or remote reboot.

🟠

Likely Case

System crash or instability when connecting to WiFi networks, particularly during authentication/association phases.

🟢

If Mitigated

Minor service interruption if system automatically recovers from kernel panic, but potential data loss in active connections.

🌐 Internet-Facing: LOW - Requires local WiFi hardware access and driver interaction, not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Internal attackers with WiFi access could potentially trigger the crash, but requires specific hardware/driver combination.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger RF calibration with specific negative results. Stack trace shows wpa_supplicant process triggering it, suggesting WiFi authentication/association could trigger it.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits 065e83ac83c0c0e615b96947145c85c4bd76c09a, 5abc81a138f873ab55223ec674afc3a3f945d60f, or 683a4647a7a3044868cfdc14c117525091b9fa0c

Vendor Advisory: https://git.kernel.org/stable/c/065e83ac83c0c0e615b96947145c85c4bd76c09a

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify rtw89 driver is updated.

🔧 Temporary Workarounds

Disable rtw89 driver

linux

Blacklist or disable the rtw89 driver to prevent loading

echo 'blacklist rtw89_core' >> /etc/modprobe.d/blacklist-rtw89.conf
update-initramfs -u
reboot

Use alternative WiFi hardware

linux

Replace Realtek 8852A hardware with different WiFi chipset

🧯 If You Can't Patch

  • Disable WiFi functionality on affected systems
  • Implement network segmentation to limit WiFi access to trusted devices only

🔍 How to Verify

Check if Vulnerable:

Check if system uses rtw89 driver: lsmod | grep rtw89. Check kernel version: uname -r and compare with patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits. Check dmesg for absence of 'divide error' messages related to rtw8852a_dpk.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages with 'divide error'
  • Stack traces containing 'rtw8852a_dpk'
  • wpa_supplicant crashes during authentication

Network Indicators:

  • WiFi connection failures on affected hardware
  • Unexpected system reboots during WiFi operations

SIEM Query:

source="kernel" AND ("divide error" OR "rtw8852a_dpk")

🔗 References

📤 Share & Export