Skip to main content

CVE-2022-48655: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-48655cvecve-2022-48655
Published: Sun Apr 28 2024 (04/28/2024, 13:01:00 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Harden accesses to the reset domains Accessing reset domains descriptors by the index upon the SCMI drivers requests through the SCMI reset operations interface can potentially lead to out-of-bound violations if the SCMI driver misbehave. Add an internal consistency check before any such domains descriptors accesses.

AI-Powered Analysis

AILast updated: 07/03/2025, 03:11:02 UTC

Technical Analysis

CVE-2022-48655 is a high-severity vulnerability affecting the Linux kernel, specifically within the firmware component arm_scmi (System Control and Management Interface). The vulnerability arises from improper handling of reset domain descriptors accessed by index during SCMI reset operations. If the SCMI driver behaves incorrectly or maliciously, it can cause out-of-bounds memory access violations. This can lead to memory corruption, potentially allowing an attacker to execute arbitrary code, cause denial of service, or escalate privileges. The vulnerability is classified under CWE-125 (Out-of-bounds Read), indicating that the kernel does not properly validate the index used to access reset domain descriptors. The fix involves adding internal consistency checks before accessing these descriptors to prevent out-of-bound accesses. The vulnerability has a CVSS v3.1 base score of 8.1, reflecting its high impact on confidentiality, integrity, and availability, with network attack vector, high attack complexity, no privileges required, and no user interaction needed. There are no known exploits in the wild as of the published date (April 28, 2024). The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is relevant to systems running affected kernel builds that include the vulnerable arm_scmi firmware driver code.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those relying on Linux-based systems in critical infrastructure, embedded devices, and servers using ARM architecture. Exploitation could lead to unauthorized access, system crashes, or persistent compromise of devices running vulnerable kernels. This is particularly concerning for sectors such as telecommunications, manufacturing, automotive, and IoT deployments prevalent in Europe, where ARM-based Linux systems are common. The ability to exploit this vulnerability remotely without authentication increases the threat level. Compromise could disrupt business operations, lead to data breaches, or enable attackers to establish footholds for further lateral movement within networks. Given the widespread use of Linux in European enterprises and government agencies, the vulnerability could have broad implications if not promptly addressed.

Mitigation Recommendations

European organizations should prioritize patching affected Linux kernel versions by applying updates that include the fix for CVE-2022-48655. Since the vulnerability is in the arm_scmi firmware driver, organizations using ARM-based Linux systems should verify kernel versions and update to patched releases. Additionally, organizations should implement strict kernel module loading policies and monitor for unusual SCMI driver behavior or reset domain access patterns. Employing runtime integrity checks and memory protection mechanisms can help detect exploitation attempts. Network segmentation and limiting exposure of vulnerable systems to untrusted networks will reduce attack surface. Security teams should also review device inventories to identify ARM-based Linux systems and ensure they are included in patch management workflows. Finally, monitoring security advisories from Linux kernel maintainers and subscribing to vulnerability feeds will help maintain situational awareness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-25T13:44:28.317Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5ddd

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 7/3/2025, 3:11:02 AM

Last updated: 7/30/2025, 5:32:41 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats