Skip to main content

CVE-2022-36946: n/a in n/a

High
VulnerabilityCVE-2022-36946cvecve-2022-36946
Published: Wed Jul 27 2022 (07/27/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.

AI-Powered Analysis

AILast updated: 07/03/2025, 11:43:39 UTC

Technical Analysis

CVE-2022-36946 is a high-severity vulnerability in the Linux kernel's netfilter subsystem, specifically within the nfnetlink_queue component (nfqnl_mangle function) up to version 5.18.14. The vulnerability arises when processing an nf_queue verdict containing a one-byte nfta_payload attribute. In this scenario, the skb_pull operation can encounter a negative skb->len value, which leads to a kernel panic, effectively causing a denial of service (DoS). This vulnerability is exploitable remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise. The vulnerability does not have known exploits in the wild as of the publication date. The root cause is a lack of proper validation of the payload length in the netfilter queue processing code, which allows crafted network packets to trigger the kernel panic. This vulnerability affects Linux kernel versions through 5.18.14, which are commonly used in various server and embedded environments. Given the kernel's central role in system operation, a successful exploit results in system crashes and service interruptions, which can be leveraged by attackers to disrupt critical infrastructure or services relying on vulnerable Linux systems.

Potential Impact

For European organizations, the impact of CVE-2022-36946 can be significant, especially for those relying on Linux-based servers, network appliances, or embedded devices that utilize the netfilter framework for packet filtering and firewalling. The denial of service caused by this vulnerability can disrupt business operations, leading to downtime of critical services such as web hosting, VPN gateways, or network security devices. Organizations in sectors like finance, telecommunications, healthcare, and government, which often deploy Linux-based infrastructure, may face operational disruptions and potential financial losses. Additionally, service providers hosting infrastructure for multiple clients could experience cascading effects impacting multiple customers. Although the vulnerability does not allow data theft or system compromise beyond DoS, the availability impact alone can be severe, especially in environments requiring high uptime and reliability. The remote and unauthenticated nature of the exploit increases the risk of automated attacks or scanning by threat actors targeting exposed Linux systems.

Mitigation Recommendations

To mitigate CVE-2022-36946, European organizations should: 1) Immediately identify and inventory Linux systems running kernel versions up to 5.18.14, focusing on those using netfilter and nfnetlink_queue features. 2) Apply vendor-provided patches or upgrade the Linux kernel to versions beyond 5.18.14 where the vulnerability is resolved. If official patches are unavailable, consider backporting fixes from newer kernel releases or applying community patches. 3) Implement network-level protections such as firewall rules or intrusion prevention systems to block or filter suspicious netfilter queue traffic that could exploit this vulnerability. 4) Monitor network traffic and system logs for unusual packet patterns or kernel panic events indicative of exploitation attempts. 5) Employ segmentation and isolation strategies to limit exposure of vulnerable systems to untrusted networks, reducing the attack surface. 6) Establish incident response procedures to quickly recover from potential DoS incidents caused by this vulnerability, including system restarts and failover mechanisms. 7) Engage with Linux distribution vendors and security mailing lists to stay informed about updates and advisories related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-27T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc319

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 11:43:39 AM

Last updated: 7/28/2025, 3:34:40 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats