CVE-2022-28388: n/a in n/a
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
AI Analysis
Technical Summary
CVE-2022-28388 is a vulnerability identified in the Linux kernel, specifically in the usb_8dev_start_xmit function located in the drivers/net/can/usb/usb_8dev.c source file. This vulnerability is characterized as a double free condition, which occurs when the kernel attempts to free the same memory location twice. The affected Linux kernel versions include all versions up to and including 5.17.1. The double free vulnerability can lead to undefined behavior such as kernel crashes (denial of service) or potentially enable an attacker to execute arbitrary code with kernel privileges if exploited successfully. The vulnerability is classified under CWE-415 (Double Free), which is a common memory management error that can compromise system stability and security. The CVSS v3.1 base score is 5.5 (medium severity), with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). There are no known exploits in the wild as of the publication date, and no official patches were linked in the provided information, though it is expected that kernel maintainers would address this in subsequent releases. This vulnerability affects Linux systems that utilize the CAN (Controller Area Network) USB driver, which is typically used in automotive and industrial control environments to interface with CAN bus networks via USB devices.
Potential Impact
For European organizations, the impact of CVE-2022-28388 depends largely on their use of Linux systems with CAN USB interfaces. Industries such as automotive manufacturing, industrial automation, and critical infrastructure sectors that rely on CAN bus communications for device control and monitoring are at higher risk. Exploitation could lead to denial of service conditions on affected systems, potentially disrupting operations or safety-critical functions. While the vulnerability does not directly compromise confidentiality or integrity, the loss of availability in industrial control systems or automotive diagnostic tools could have significant operational and safety repercussions. European organizations involved in automotive R&D, manufacturing plants, and utilities that integrate Linux-based CAN USB devices should be particularly vigilant. The requirement for local privileges to exploit the vulnerability limits remote attack vectors but insider threats or compromised local accounts could leverage this flaw to cause disruptions.
Mitigation Recommendations
To mitigate CVE-2022-28388, European organizations should: 1) Ensure all Linux systems, especially those involved in CAN bus communications, are updated to kernel versions later than 5.17.1 where the vulnerability is patched. 2) Restrict local access to systems running vulnerable kernels by enforcing strict access controls and monitoring for unauthorized logins. 3) Implement robust endpoint security solutions that can detect anomalous kernel behavior or memory corruption attempts. 4) Conduct regular audits of systems using CAN USB drivers to identify and isolate vulnerable devices. 5) For critical environments, consider network segmentation to limit exposure of CAN USB devices to only trusted users and systems. 6) Engage with Linux kernel security mailing lists and vendor advisories to track patch releases and apply them promptly. 7) Employ runtime protection mechanisms such as kernel hardening features (e.g., KASLR, SMEP, SMAP) to reduce exploitation likelihood. These steps go beyond generic patching advice by emphasizing access control, monitoring, and environment-specific risk reduction.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Sweden, Belgium
CVE-2022-28388: n/a in n/a
Description
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
AI-Powered Analysis
Technical Analysis
CVE-2022-28388 is a vulnerability identified in the Linux kernel, specifically in the usb_8dev_start_xmit function located in the drivers/net/can/usb/usb_8dev.c source file. This vulnerability is characterized as a double free condition, which occurs when the kernel attempts to free the same memory location twice. The affected Linux kernel versions include all versions up to and including 5.17.1. The double free vulnerability can lead to undefined behavior such as kernel crashes (denial of service) or potentially enable an attacker to execute arbitrary code with kernel privileges if exploited successfully. The vulnerability is classified under CWE-415 (Double Free), which is a common memory management error that can compromise system stability and security. The CVSS v3.1 base score is 5.5 (medium severity), with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). There are no known exploits in the wild as of the publication date, and no official patches were linked in the provided information, though it is expected that kernel maintainers would address this in subsequent releases. This vulnerability affects Linux systems that utilize the CAN (Controller Area Network) USB driver, which is typically used in automotive and industrial control environments to interface with CAN bus networks via USB devices.
Potential Impact
For European organizations, the impact of CVE-2022-28388 depends largely on their use of Linux systems with CAN USB interfaces. Industries such as automotive manufacturing, industrial automation, and critical infrastructure sectors that rely on CAN bus communications for device control and monitoring are at higher risk. Exploitation could lead to denial of service conditions on affected systems, potentially disrupting operations or safety-critical functions. While the vulnerability does not directly compromise confidentiality or integrity, the loss of availability in industrial control systems or automotive diagnostic tools could have significant operational and safety repercussions. European organizations involved in automotive R&D, manufacturing plants, and utilities that integrate Linux-based CAN USB devices should be particularly vigilant. The requirement for local privileges to exploit the vulnerability limits remote attack vectors but insider threats or compromised local accounts could leverage this flaw to cause disruptions.
Mitigation Recommendations
To mitigate CVE-2022-28388, European organizations should: 1) Ensure all Linux systems, especially those involved in CAN bus communications, are updated to kernel versions later than 5.17.1 where the vulnerability is patched. 2) Restrict local access to systems running vulnerable kernels by enforcing strict access controls and monitoring for unauthorized logins. 3) Implement robust endpoint security solutions that can detect anomalous kernel behavior or memory corruption attempts. 4) Conduct regular audits of systems using CAN USB drivers to identify and isolate vulnerable devices. 5) For critical environments, consider network segmentation to limit exposure of CAN USB devices to only trusted users and systems. 6) Engage with Linux kernel security mailing lists and vendor advisories to track patch releases and apply them promptly. 7) Employ runtime protection mechanisms such as kernel hardening features (e.g., KASLR, SMEP, SMAP) to reduce exploitation likelihood. These steps go beyond generic patching advice by emphasizing access control, monitoring, and environment-specific risk reduction.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-04-03T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdc154
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:54:47 PM
Last updated: 2/3/2026, 1:35:24 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7760: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ofisimo Web-Based Software Technologies Association Web Package Flora
HighCVE-2025-6397: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ankara Hosting Website Design Website Software
HighHackers Leak 5.1 Million Panera Bread Records
MediumCVE-2026-1664: CWE-639 Authorization Bypass Through User-Controlled Key
MediumCVE-2025-11598: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Centralny Ośrodek Informatyki mObywatel
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.