Skip to main content

CVE-2022-2741: Uncontrolled Resource Consumption (CWE-400) in zephyrproject-rtos zephyr

High
VulnerabilityCVE-2022-2741cvecve-2022-2741cwe-400
Published: Mon Oct 31 2022 (10/31/2022, 17:45:09 UTC)
Source: CVE
Vendor/Project: zephyrproject-rtos
Product: zephyr

Description

The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa).

AI-Powered Analysis

AILast updated: 07/05/2025, 22:12:56 UTC

Technical Analysis

CVE-2022-2741 is a high-severity vulnerability in the Zephyr real-time operating system (RTOS), specifically related to its Controller Area Network (CAN) protocol implementation. The vulnerability is classified as an uncontrolled resource consumption issue (CWE-400), which can lead to a denial-of-service (DoS) condition. The attack vector involves transmitting a specially crafted CAN frame on the same CAN network as the vulnerable node. The malicious frame must have a CAN ID that matches an installed filter on the target node, which can be deduced through traffic analysis of the CAN bus. Additionally, the frame must have the opposite Remote Transmission Request (RTR) bit value compared to what the filter expects—if the filter matches RTR frames, the attacker sends a data frame, and vice versa. This mismatch causes the vulnerable node to consume excessive resources, leading to a denial of service. The vulnerability does not require authentication or user interaction and can be exploited remotely over the CAN network. The CVSS 3.1 base score is 8.2, reflecting high severity, with the vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and high availability impact. No known exploits are currently reported in the wild, and no specific patched versions are listed, indicating that mitigation may require custom fixes or updates from the Zephyr project. This vulnerability is particularly relevant for embedded systems using Zephyr RTOS with CAN bus communication, such as automotive, industrial control, and IoT devices.

Potential Impact

For European organizations, the impact of CVE-2022-2741 can be significant, especially those involved in automotive manufacturing, industrial automation, and critical infrastructure sectors that utilize embedded systems running Zephyr RTOS with CAN bus interfaces. Exploitation can cause denial of service on affected nodes, potentially disrupting vehicle subsystems, industrial control processes, or IoT device operations. This can lead to operational downtime, safety risks, and financial losses. Given the widespread use of CAN networks in automotive and industrial environments, this vulnerability could affect supply chains and critical services. The lack of confidentiality impact reduces risks related to data breaches, but the integrity and availability impacts are concerning, as attackers can disrupt system functionality. European organizations with connected vehicles, smart factories, or critical infrastructure relying on Zephyr RTOS must consider this threat seriously to maintain operational continuity and safety compliance.

Mitigation Recommendations

To mitigate CVE-2022-2741, European organizations should: 1) Monitor Zephyr project updates closely and apply patches or firmware updates as soon as they become available. 2) Implement network segmentation and isolation for CAN networks to limit exposure to untrusted devices or external networks. 3) Employ CAN bus traffic monitoring and anomaly detection to identify unusual frames, especially those with suspicious CAN IDs or RTR bit mismatches. 4) Restrict physical and logical access to CAN networks to prevent unauthorized frame injection. 5) Where possible, configure CAN filters more restrictively to reduce the attack surface and avoid accepting frames with unexpected RTR bit values. 6) Collaborate with device and system vendors to ensure secure firmware updates and incorporate secure boot mechanisms to prevent unauthorized code execution. 7) Conduct security assessments and penetration testing focused on CAN bus interfaces and Zephyr RTOS implementations to identify and remediate vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zephyr
Date Reserved
2022-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdca9b

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/5/2025, 10:12:56 PM

Last updated: 7/26/2025, 2:54:53 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats