Skip to main content

CVE-2022-28388: n/a in n/a

Medium
VulnerabilityCVE-2022-28388cvecve-2022-28388
Published: Sun Apr 03 2022 (04/03/2022, 20:07:39 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.

AI-Powered Analysis

AILast updated: 07/06/2025, 23:54:47 UTC

Technical Analysis

CVE-2022-28388 is a vulnerability identified in the Linux kernel, specifically in the usb_8dev_start_xmit function located in the drivers/net/can/usb/usb_8dev.c source file. This vulnerability is characterized as a double free condition, which occurs when the kernel attempts to free the same memory location twice. The affected Linux kernel versions include all versions up to and including 5.17.1. The double free vulnerability can lead to undefined behavior such as kernel crashes (denial of service) or potentially enable an attacker to execute arbitrary code with kernel privileges if exploited successfully. The vulnerability is classified under CWE-415 (Double Free), which is a common memory management error that can compromise system stability and security. The CVSS v3.1 base score is 5.5 (medium severity), with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). There are no known exploits in the wild as of the publication date, and no official patches were linked in the provided information, though it is expected that kernel maintainers would address this in subsequent releases. This vulnerability affects Linux systems that utilize the CAN (Controller Area Network) USB driver, which is typically used in automotive and industrial control environments to interface with CAN bus networks via USB devices.

Potential Impact

For European organizations, the impact of CVE-2022-28388 depends largely on their use of Linux systems with CAN USB interfaces. Industries such as automotive manufacturing, industrial automation, and critical infrastructure sectors that rely on CAN bus communications for device control and monitoring are at higher risk. Exploitation could lead to denial of service conditions on affected systems, potentially disrupting operations or safety-critical functions. While the vulnerability does not directly compromise confidentiality or integrity, the loss of availability in industrial control systems or automotive diagnostic tools could have significant operational and safety repercussions. European organizations involved in automotive R&D, manufacturing plants, and utilities that integrate Linux-based CAN USB devices should be particularly vigilant. The requirement for local privileges to exploit the vulnerability limits remote attack vectors but insider threats or compromised local accounts could leverage this flaw to cause disruptions.

Mitigation Recommendations

To mitigate CVE-2022-28388, European organizations should: 1) Ensure all Linux systems, especially those involved in CAN bus communications, are updated to kernel versions later than 5.17.1 where the vulnerability is patched. 2) Restrict local access to systems running vulnerable kernels by enforcing strict access controls and monitoring for unauthorized logins. 3) Implement robust endpoint security solutions that can detect anomalous kernel behavior or memory corruption attempts. 4) Conduct regular audits of systems using CAN USB drivers to identify and isolate vulnerable devices. 5) For critical environments, consider network segmentation to limit exposure of CAN USB devices to only trusted users and systems. 6) Engage with Linux kernel security mailing lists and vendor advisories to track patch releases and apply them promptly. 7) Employ runtime protection mechanisms such as kernel hardening features (e.g., KASLR, SMEP, SMAP) to reduce exploitation likelihood. These steps go beyond generic patching advice by emphasizing access control, monitoring, and environment-specific risk reduction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-04-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdc154

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 11:54:47 PM

Last updated: 8/9/2025, 2:51:05 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats