CVE-2022-42720: n/a in n/a
Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.
AI Analysis
Technical Summary
CVE-2022-42720 is a high-severity vulnerability affecting the mac80211 wireless stack in the Linux kernel versions from 5.1 through 5.19.x prior to 5.19.16. The vulnerability arises from multiple reference counting bugs in the multi-BSS (Basic Service Set) handling code. These bugs can lead to use-after-free conditions, a type of memory corruption where the system continues to use memory after it has been freed. Exploiting this vulnerability requires local attacker capabilities, specifically the ability to inject WLAN frames, which implies that the attacker must be within wireless range and able to interact with the affected device's wireless interface. Successful exploitation could allow an attacker to execute arbitrary code with kernel privileges, potentially leading to full system compromise. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with attack vector classified as local, requiring low attack complexity and low privileges, and no user interaction. The vulnerability is categorized under CWE-416 (Use After Free). Although no known exploits are reported in the wild, the presence of a use-after-free in kernel wireless code represents a significant risk, especially for devices relying on vulnerable Linux kernel versions. No specific vendor or product is listed, but the affected component is the Linux kernel mac80211 subsystem, widely used in many Linux-based systems including servers, desktops, and embedded devices. The vulnerability was publicly disclosed on October 13, 2022, and fixed in Linux kernel version 5.19.16. No direct patch links are provided in the data, but the fix is available in the official kernel updates.
Potential Impact
For European organizations, this vulnerability poses a substantial risk particularly to those using Linux-based systems with vulnerable kernel versions in their wireless infrastructure. This includes enterprise laptops, wireless access points, IoT devices, and embedded systems that rely on the mac80211 stack. Exploitation could lead to unauthorized code execution at the kernel level, allowing attackers to bypass security controls, escalate privileges, and potentially move laterally within networks. Confidentiality of sensitive data could be compromised, integrity of systems undermined, and availability disrupted through kernel crashes or malicious payloads. Given the local attack vector requiring WLAN frame injection, organizations with dense wireless environments or public Wi-Fi access points are at higher risk. This vulnerability could be leveraged in targeted attacks against critical infrastructure, government agencies, or enterprises with wireless-enabled Linux devices. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits over time. The potential impact is magnified in sectors with high reliance on Linux wireless networking, such as telecommunications, manufacturing, and research institutions prevalent in Europe.
Mitigation Recommendations
European organizations should prioritize updating Linux kernel versions to 5.19.16 or later where the vulnerability is patched. For systems where immediate kernel upgrades are not feasible, consider disabling or restricting wireless interfaces using the mac80211 stack, especially on critical systems. Employ network segmentation to isolate vulnerable wireless devices from sensitive network segments. Implement strict wireless access controls and monitoring to detect anomalous WLAN frame injection attempts. Utilize host-based intrusion detection systems (HIDS) capable of monitoring kernel integrity and unusual wireless activity. Regularly audit and inventory Linux systems to identify those running vulnerable kernel versions. For embedded or IoT devices, coordinate with vendors for firmware updates or mitigations. Additionally, applying kernel hardening techniques such as enabling Kernel Address Space Layout Randomization (KASLR), and using security modules like SELinux or AppArmor can reduce exploitation likelihood. Finally, maintain up-to-date threat intelligence feeds to monitor for emerging exploits targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-42720: n/a in n/a
Description
Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.
AI-Powered Analysis
Technical Analysis
CVE-2022-42720 is a high-severity vulnerability affecting the mac80211 wireless stack in the Linux kernel versions from 5.1 through 5.19.x prior to 5.19.16. The vulnerability arises from multiple reference counting bugs in the multi-BSS (Basic Service Set) handling code. These bugs can lead to use-after-free conditions, a type of memory corruption where the system continues to use memory after it has been freed. Exploiting this vulnerability requires local attacker capabilities, specifically the ability to inject WLAN frames, which implies that the attacker must be within wireless range and able to interact with the affected device's wireless interface. Successful exploitation could allow an attacker to execute arbitrary code with kernel privileges, potentially leading to full system compromise. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with attack vector classified as local, requiring low attack complexity and low privileges, and no user interaction. The vulnerability is categorized under CWE-416 (Use After Free). Although no known exploits are reported in the wild, the presence of a use-after-free in kernel wireless code represents a significant risk, especially for devices relying on vulnerable Linux kernel versions. No specific vendor or product is listed, but the affected component is the Linux kernel mac80211 subsystem, widely used in many Linux-based systems including servers, desktops, and embedded devices. The vulnerability was publicly disclosed on October 13, 2022, and fixed in Linux kernel version 5.19.16. No direct patch links are provided in the data, but the fix is available in the official kernel updates.
Potential Impact
For European organizations, this vulnerability poses a substantial risk particularly to those using Linux-based systems with vulnerable kernel versions in their wireless infrastructure. This includes enterprise laptops, wireless access points, IoT devices, and embedded systems that rely on the mac80211 stack. Exploitation could lead to unauthorized code execution at the kernel level, allowing attackers to bypass security controls, escalate privileges, and potentially move laterally within networks. Confidentiality of sensitive data could be compromised, integrity of systems undermined, and availability disrupted through kernel crashes or malicious payloads. Given the local attack vector requiring WLAN frame injection, organizations with dense wireless environments or public Wi-Fi access points are at higher risk. This vulnerability could be leveraged in targeted attacks against critical infrastructure, government agencies, or enterprises with wireless-enabled Linux devices. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits over time. The potential impact is magnified in sectors with high reliance on Linux wireless networking, such as telecommunications, manufacturing, and research institutions prevalent in Europe.
Mitigation Recommendations
European organizations should prioritize updating Linux kernel versions to 5.19.16 or later where the vulnerability is patched. For systems where immediate kernel upgrades are not feasible, consider disabling or restricting wireless interfaces using the mac80211 stack, especially on critical systems. Employ network segmentation to isolate vulnerable wireless devices from sensitive network segments. Implement strict wireless access controls and monitoring to detect anomalous WLAN frame injection attempts. Utilize host-based intrusion detection systems (HIDS) capable of monitoring kernel integrity and unusual wireless activity. Regularly audit and inventory Linux systems to identify those running vulnerable kernel versions. For embedded or IoT devices, coordinate with vendors for firmware updates or mitigations. Additionally, applying kernel hardening techniques such as enabling Kernel Address Space Layout Randomization (KASLR), and using security modules like SELinux or AppArmor can reduce exploitation likelihood. Finally, maintain up-to-date threat intelligence feeds to monitor for emerging exploits targeting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec16d
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/6/2025, 8:09:35 AM
Last updated: 8/11/2025, 11:13:51 PM
Views: 16
Related Threats
CVE-2025-3495: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Delta Electronics COMMGR
CriticalCVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.