CVE-2022-36946: n/a in n/a
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
AI Analysis
Technical Summary
CVE-2022-36946 is a high-severity vulnerability in the Linux kernel's netfilter subsystem, specifically within the nfnetlink_queue component (nfqnl_mangle function) up to version 5.18.14. The vulnerability arises when processing an nf_queue verdict containing a one-byte nfta_payload attribute. In this scenario, the skb_pull operation can encounter a negative skb->len value, which leads to a kernel panic, effectively causing a denial of service (DoS). This vulnerability is exploitable remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise. The vulnerability does not have known exploits in the wild as of the publication date. The root cause is a lack of proper validation of the payload length in the netfilter queue processing code, which allows crafted network packets to trigger the kernel panic. This vulnerability affects Linux kernel versions through 5.18.14, which are commonly used in various server and embedded environments. Given the kernel's central role in system operation, a successful exploit results in system crashes and service interruptions, which can be leveraged by attackers to disrupt critical infrastructure or services relying on vulnerable Linux systems.
Potential Impact
For European organizations, the impact of CVE-2022-36946 can be significant, especially for those relying on Linux-based servers, network appliances, or embedded devices that utilize the netfilter framework for packet filtering and firewalling. The denial of service caused by this vulnerability can disrupt business operations, leading to downtime of critical services such as web hosting, VPN gateways, or network security devices. Organizations in sectors like finance, telecommunications, healthcare, and government, which often deploy Linux-based infrastructure, may face operational disruptions and potential financial losses. Additionally, service providers hosting infrastructure for multiple clients could experience cascading effects impacting multiple customers. Although the vulnerability does not allow data theft or system compromise beyond DoS, the availability impact alone can be severe, especially in environments requiring high uptime and reliability. The remote and unauthenticated nature of the exploit increases the risk of automated attacks or scanning by threat actors targeting exposed Linux systems.
Mitigation Recommendations
To mitigate CVE-2022-36946, European organizations should: 1) Immediately identify and inventory Linux systems running kernel versions up to 5.18.14, focusing on those using netfilter and nfnetlink_queue features. 2) Apply vendor-provided patches or upgrade the Linux kernel to versions beyond 5.18.14 where the vulnerability is resolved. If official patches are unavailable, consider backporting fixes from newer kernel releases or applying community patches. 3) Implement network-level protections such as firewall rules or intrusion prevention systems to block or filter suspicious netfilter queue traffic that could exploit this vulnerability. 4) Monitor network traffic and system logs for unusual packet patterns or kernel panic events indicative of exploitation attempts. 5) Employ segmentation and isolation strategies to limit exposure of vulnerable systems to untrusted networks, reducing the attack surface. 6) Establish incident response procedures to quickly recover from potential DoS incidents caused by this vulnerability, including system restarts and failover mechanisms. 7) Engage with Linux distribution vendors and security mailing lists to stay informed about updates and advisories related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2022-36946: n/a in n/a
Description
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
AI-Powered Analysis
Technical Analysis
CVE-2022-36946 is a high-severity vulnerability in the Linux kernel's netfilter subsystem, specifically within the nfnetlink_queue component (nfqnl_mangle function) up to version 5.18.14. The vulnerability arises when processing an nf_queue verdict containing a one-byte nfta_payload attribute. In this scenario, the skb_pull operation can encounter a negative skb->len value, which leads to a kernel panic, effectively causing a denial of service (DoS). This vulnerability is exploitable remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise. The vulnerability does not have known exploits in the wild as of the publication date. The root cause is a lack of proper validation of the payload length in the netfilter queue processing code, which allows crafted network packets to trigger the kernel panic. This vulnerability affects Linux kernel versions through 5.18.14, which are commonly used in various server and embedded environments. Given the kernel's central role in system operation, a successful exploit results in system crashes and service interruptions, which can be leveraged by attackers to disrupt critical infrastructure or services relying on vulnerable Linux systems.
Potential Impact
For European organizations, the impact of CVE-2022-36946 can be significant, especially for those relying on Linux-based servers, network appliances, or embedded devices that utilize the netfilter framework for packet filtering and firewalling. The denial of service caused by this vulnerability can disrupt business operations, leading to downtime of critical services such as web hosting, VPN gateways, or network security devices. Organizations in sectors like finance, telecommunications, healthcare, and government, which often deploy Linux-based infrastructure, may face operational disruptions and potential financial losses. Additionally, service providers hosting infrastructure for multiple clients could experience cascading effects impacting multiple customers. Although the vulnerability does not allow data theft or system compromise beyond DoS, the availability impact alone can be severe, especially in environments requiring high uptime and reliability. The remote and unauthenticated nature of the exploit increases the risk of automated attacks or scanning by threat actors targeting exposed Linux systems.
Mitigation Recommendations
To mitigate CVE-2022-36946, European organizations should: 1) Immediately identify and inventory Linux systems running kernel versions up to 5.18.14, focusing on those using netfilter and nfnetlink_queue features. 2) Apply vendor-provided patches or upgrade the Linux kernel to versions beyond 5.18.14 where the vulnerability is resolved. If official patches are unavailable, consider backporting fixes from newer kernel releases or applying community patches. 3) Implement network-level protections such as firewall rules or intrusion prevention systems to block or filter suspicious netfilter queue traffic that could exploit this vulnerability. 4) Monitor network traffic and system logs for unusual packet patterns or kernel panic events indicative of exploitation attempts. 5) Employ segmentation and isolation strategies to limit exposure of vulnerable systems to untrusted networks, reducing the attack surface. 6) Establish incident response procedures to quickly recover from potential DoS incidents caused by this vulnerability, including system restarts and failover mechanisms. 7) Engage with Linux distribution vendors and security mailing lists to stay informed about updates and advisories related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-07-27T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc319
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/3/2025, 11:43:39 AM
Last updated: 7/28/2025, 3:34:40 PM
Views: 10
Related Threats
CVE-2025-8951: SQL Injection in PHPGurukul Teachers Record Management System
MediumCVE-2025-8950: SQL Injection in Campcodes Online Recruitment Management System
MediumCVE-2025-27388: CWE-20 Improper Input Validation in OPPO OPPO HEALTH APP
HighCVE-2025-8949: Stack-based Buffer Overflow in D-Link DIR-825
HighCVE-2025-8948: SQL Injection in projectworlds Visitor Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.