Skip to main content

CVE-2022-3903: CWE-843 in Kernel

Medium
VulnerabilityCVE-2022-3903cvecve-2022-3903cwe-843
Published: Mon Nov 14 2022 (11/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Kernel

Description

An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.

AI-Powered Analysis

AILast updated: 06/25/2025, 12:02:15 UTC

Technical Analysis

CVE-2022-3903 is a medium-severity vulnerability identified in the Linux kernel, specifically within the Infrared Transceiver USB driver. The flaw is categorized under CWE-843, which relates to an incorrect read request. This vulnerability arises when a user connects a malicious USB device that exploits improper handling of read requests by the driver. The exploit does not require any privileges or user interaction, making it accessible to local users who can physically attach a crafted USB device. The primary consequence of this vulnerability is resource starvation, which can lead to a denial of service (DoS) condition by crashing or hanging the affected system. The vulnerability affects Linux kernel version 6.1-rc5, a release candidate version, indicating that it may impact systems running this or similar kernel versions if the driver is enabled. The CVSS v3.1 base score is 4.6, reflecting a medium severity level, with the vector indicating that the attack requires physical access (AV:P), low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). There are no known exploits in the wild, and no patches are explicitly linked in the provided data, though kernel maintainers typically address such issues promptly. The vulnerability is significant because it can be triggered by simply plugging in a malicious USB device, which is a common attack vector in many environments. The Infrared Transceiver USB driver is not universally enabled on all Linux systems, but where present, it represents a potential attack surface for local adversaries aiming to disrupt system availability.

Potential Impact

For European organizations, the impact of CVE-2022-3903 primarily concerns availability disruptions. Organizations relying on Linux systems with the affected kernel version and Infrared Transceiver USB driver enabled could experience system crashes or denial of service, potentially interrupting critical services or operations. This is particularly relevant for sectors with high reliance on Linux infrastructure, such as telecommunications, research institutions, and industrial control systems. The requirement for physical access limits remote exploitation but raises concerns for environments with shared physical access or where endpoint security is lax. The vulnerability could be exploited in scenarios such as insider threats or targeted sabotage, leading to operational downtime and associated financial or reputational damage. Given the lack of impact on confidentiality or integrity, data breaches are unlikely; however, service availability interruptions could affect business continuity and compliance with service-level agreements. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. Organizations with Linux kernel 6.1-rc5 or similar versions in use should assess their exposure, particularly if Infrared Transceiver USB hardware is present or enabled.

Mitigation Recommendations

To mitigate CVE-2022-3903, European organizations should take the following specific actions: 1) Verify if the Infrared Transceiver USB driver is enabled and in use on their Linux systems, especially those running kernel 6.1-rc5 or related versions. 2) If the driver is not required, disable or blacklist the Infrared Transceiver USB driver module to eliminate the attack surface. 3) Apply the latest stable Linux kernel updates and patches as soon as they become available, since kernel maintainers typically address such vulnerabilities promptly. 4) Implement strict physical security controls to prevent unauthorized personnel from connecting USB devices to critical systems, including the use of USB port locks or endpoint security solutions that restrict USB device usage. 5) Employ monitoring tools to detect unusual USB device connections or system resource anomalies that may indicate exploitation attempts. 6) Educate staff about the risks of connecting untrusted USB devices and enforce policies restricting the use of personal or unknown USB hardware on organizational systems. 7) For environments where Infrared Transceiver functionality is essential, consider isolating affected systems or using virtualization/containerization to limit the impact of potential DoS conditions. These targeted measures go beyond generic advice by focusing on the specific driver and kernel version affected, physical access controls, and proactive system configuration.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2022-11-08T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed848

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 12:02:15 PM

Last updated: 7/26/2025, 11:18:41 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats