CVE-2023-1073

6.6 MEDIUM

📋 TL;DR

A memory corruption vulnerability in the Linux kernel's HID subsystem allows local attackers to crash the system or potentially escalate privileges by inserting a malicious USB device. This affects Linux systems with vulnerable kernel versions. Attackers need physical or local USB access to exploit this flaw.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific vulnerable versions vary by distribution; generally affects kernels before fixes in late 2022/early 2023.
Operating Systems: Linux distributions including Red Hat, Debian, Ubuntu, CentOS, etc.
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where USB HID devices can be connected. Virtual/cloud systems may be affected if USB passthrough is enabled.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, complete system compromise, or kernel panic causing system crash.

🟠

Likely Case

Kernel crash/panic leading to denial of service and system reboot requirement.

🟢

If Mitigated

Limited to denial of service if privilege escalation fails or system has additional security controls.

🌐 Internet-Facing: LOW - Requires physical USB access or local system access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Insider threats or compromised local accounts could exploit this if they gain USB access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires physical USB device insertion or USB emulation capabilities. Proof-of-concept code exists in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by distribution. Check specific vendor advisories for patched kernel versions.

Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=2173403

Restart Required: Yes

Instructions:

1. Check your Linux distribution's security advisories. 2. Update kernel packages via package manager (e.g., 'apt update && apt upgrade' for Debian/Ubuntu, 'yum update' for RHEL/CentOS). 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

USB Device Restriction

linux

Restrict USB device usage through udev rules or physical port disabling.

Create udev rule: echo 'SUBSYSTEM=="usb", ATTR{idVendor}=="xxxx", ATTR{idProduct}=="yyyy", MODE="0000"' > /etc/udev/rules.d/99-usb-restrict.rules
Reload udev: udevadm control --reload-rules && udevadm trigger

Kernel Module Blacklisting

linux

Blacklist specific HID drivers if not needed.

echo 'blacklist hid-generic' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u (for Debian/Ubuntu) or dracut --force (for RHEL/CentOS)

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized USB device connections.
  • Use mandatory access control systems (SELinux/AppArmor) to limit kernel module loading and device access.

🔍 How to Verify

Check if Vulnerable:

Check kernel version against vendor advisories: uname -r and compare with patched versions in distribution security notices.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update: uname -r should match patched version from vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/messages or dmesg
  • USB device insertion logs with suspicious vendor/product IDs
  • System crash/reboot events without clear cause

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

source="kernel" AND "panic" OR "Oops" OR "general protection fault" AND process="hid"

🔗 References

📤 Share & Export