CVE-2022-41674: n/a in n/a
An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.
AI Analysis
Technical Summary
CVE-2022-41674 is a high-severity vulnerability affecting the Linux kernel versions prior to 5.19.16. The flaw exists in the ieee80211_bss_info_update function within the net/mac80211/scan.c source file. Specifically, this vulnerability is a buffer overflow (CWE-787) triggered by processing maliciously crafted WLAN frames. An attacker capable of injecting WLAN frames into the network vicinity can exploit this vulnerability without requiring any privileges or user interaction. The buffer overflow can lead to a denial of service (crash of the kernel) or potentially allow an attacker to execute arbitrary code in kernel context, compromising system confidentiality and availability. The CVSS 3.1 base score is 8.1, reflecting the high impact on confidentiality and availability, ease of exploitation (network attack vector, no privileges required, no user interaction), and the fact that the scope remains unchanged (the vulnerability affects the same security scope). No known exploits have been reported in the wild as of the published date, but the potential for exploitation exists given the nature of the vulnerability. The vulnerability is rooted in the handling of wireless LAN management frames, which are commonly processed by devices using Linux-based operating systems with wireless capabilities. This includes a wide range of devices from servers and desktops to embedded systems and IoT devices running vulnerable Linux kernels. The absence of vendor or product-specific information suggests that this is a generic Linux kernel issue affecting all distributions using kernel versions before 5.19.16 that have the mac80211 wireless stack enabled.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Linux-based infrastructure with wireless networking capabilities. The ability for an unauthenticated attacker to cause a kernel-level buffer overflow remotely via WLAN frames means that attackers within wireless range can disrupt critical systems or potentially gain kernel-level control. This can lead to service outages, data breaches, or lateral movement within networks. Industries with high reliance on wireless connectivity, such as telecommunications, manufacturing (Industry 4.0), healthcare, and public sector entities, are particularly at risk. Additionally, organizations using Linux-based IoT devices or embedded systems in operational technology environments may face increased exposure. The impact is heightened in dense urban areas or corporate campuses where attackers can physically approach wireless networks. Given the high confidentiality impact, sensitive data processed on affected systems could be exposed if exploitation leads to code execution. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge. The vulnerability also challenges organizations' ability to maintain availability of critical services, as kernel crashes can cause system downtime.
Mitigation Recommendations
To mitigate CVE-2022-41674, European organizations should prioritize updating Linux kernels to version 5.19.16 or later, where the vulnerability is patched. For environments where immediate kernel upgrades are not feasible, organizations should consider disabling or restricting wireless interfaces on critical systems to limit exposure to WLAN frame injection attacks. Network segmentation can help isolate vulnerable devices from untrusted wireless networks. Employing wireless intrusion detection/prevention systems (WIDS/WIPS) to monitor and block suspicious WLAN frames can reduce the attack surface. Organizations should also audit their Linux-based devices to identify those running vulnerable kernel versions with mac80211 enabled. For embedded and IoT devices, coordinate with vendors to obtain firmware updates or apply mitigations such as disabling wireless features if not required. Additionally, implementing strict physical security controls to limit attacker proximity to wireless networks can reduce risk. Monitoring system logs for kernel crashes or unusual wireless activity can aid in early detection of exploitation attempts. Finally, organizations should integrate this vulnerability into their patch management and vulnerability scanning processes to ensure timely remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2022-41674: n/a in n/a
Description
An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.
AI-Powered Analysis
Technical Analysis
CVE-2022-41674 is a high-severity vulnerability affecting the Linux kernel versions prior to 5.19.16. The flaw exists in the ieee80211_bss_info_update function within the net/mac80211/scan.c source file. Specifically, this vulnerability is a buffer overflow (CWE-787) triggered by processing maliciously crafted WLAN frames. An attacker capable of injecting WLAN frames into the network vicinity can exploit this vulnerability without requiring any privileges or user interaction. The buffer overflow can lead to a denial of service (crash of the kernel) or potentially allow an attacker to execute arbitrary code in kernel context, compromising system confidentiality and availability. The CVSS 3.1 base score is 8.1, reflecting the high impact on confidentiality and availability, ease of exploitation (network attack vector, no privileges required, no user interaction), and the fact that the scope remains unchanged (the vulnerability affects the same security scope). No known exploits have been reported in the wild as of the published date, but the potential for exploitation exists given the nature of the vulnerability. The vulnerability is rooted in the handling of wireless LAN management frames, which are commonly processed by devices using Linux-based operating systems with wireless capabilities. This includes a wide range of devices from servers and desktops to embedded systems and IoT devices running vulnerable Linux kernels. The absence of vendor or product-specific information suggests that this is a generic Linux kernel issue affecting all distributions using kernel versions before 5.19.16 that have the mac80211 wireless stack enabled.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Linux-based infrastructure with wireless networking capabilities. The ability for an unauthenticated attacker to cause a kernel-level buffer overflow remotely via WLAN frames means that attackers within wireless range can disrupt critical systems or potentially gain kernel-level control. This can lead to service outages, data breaches, or lateral movement within networks. Industries with high reliance on wireless connectivity, such as telecommunications, manufacturing (Industry 4.0), healthcare, and public sector entities, are particularly at risk. Additionally, organizations using Linux-based IoT devices or embedded systems in operational technology environments may face increased exposure. The impact is heightened in dense urban areas or corporate campuses where attackers can physically approach wireless networks. Given the high confidentiality impact, sensitive data processed on affected systems could be exposed if exploitation leads to code execution. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge. The vulnerability also challenges organizations' ability to maintain availability of critical services, as kernel crashes can cause system downtime.
Mitigation Recommendations
To mitigate CVE-2022-41674, European organizations should prioritize updating Linux kernels to version 5.19.16 or later, where the vulnerability is patched. For environments where immediate kernel upgrades are not feasible, organizations should consider disabling or restricting wireless interfaces on critical systems to limit exposure to WLAN frame injection attacks. Network segmentation can help isolate vulnerable devices from untrusted wireless networks. Employing wireless intrusion detection/prevention systems (WIDS/WIPS) to monitor and block suspicious WLAN frames can reduce the attack surface. Organizations should also audit their Linux-based devices to identify those running vulnerable kernel versions with mac80211 enabled. For embedded and IoT devices, coordinate with vendors to obtain firmware updates or apply mitigations such as disabling wireless features if not required. Additionally, implementing strict physical security controls to limit attacker proximity to wireless networks can reduce risk. Monitoring system logs for kernel crashes or unusual wireless activity can aid in early detection of exploitation attempts. Finally, organizations should integrate this vulnerability into their patch management and vulnerability scanning processes to ensure timely remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-09-28T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec6b7
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 11:28:15 AM
Last updated: 8/11/2025, 11:57:17 AM
Views: 20
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.