CVE-2022-49533: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ath11k: Change max no of active probe SSID and BSSID to fw capability The maximum number of SSIDs in a for active probe requests is currently reported as 16 (WLAN_SCAN_PARAMS_MAX_SSID) when registering the driver. The scan_req_params structure only has the capacity to hold 10 SSIDs. This leads to a buffer overflow which can be triggered from wpa_supplicant in userspace. When copying the SSIDs into the scan_req_params structure in the ath11k_mac_op_hw_scan route, it can overwrite the extraie pointer. Firmware supports 16 ssid * 4 bssid, for each ssid 4 bssid combo probe request will be sent, so totally 64 probe requests supported. So set both max ssid and bssid to 16 and 4 respectively. Remove the redundant macros of ssid and bssid. Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.7.0.1-01300-QCAHKSWPL_SILICONZ-1
AI Analysis
Technical Summary
CVE-2022-49533 is a vulnerability identified in the Linux kernel's ath11k wireless driver, specifically related to the handling of active probe requests for Wi-Fi scanning. The issue arises from a mismatch between the maximum number of SSIDs (Service Set Identifiers) reported by the driver and the actual capacity of the data structure used to hold these SSIDs during scanning operations. The driver reports a maximum of 16 SSIDs (WLAN_SCAN_PARAMS_MAX_SSID), but the scan_req_params structure only has capacity for 10 SSIDs. This discrepancy leads to a buffer overflow when the wpa_supplicant user-space process triggers a scan and the SSIDs are copied into the scan_req_params structure within the ath11k_mac_op_hw_scan function. The overflow can overwrite adjacent memory, including the extraie pointer, potentially leading to memory corruption. The firmware supports up to 16 SSIDs and 4 BSSIDs (Basic Service Set Identifiers) per SSID, allowing for a total of 64 probe requests. The fix involves aligning the maximum SSID and BSSID counts with firmware capabilities and removing redundant macros to prevent the buffer overflow. The vulnerability was tested on IPQ8074 hardware with specific firmware versions. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected ath11k wireless driver, particularly those using Qualcomm IPQ8074-based Wi-Fi hardware or similar devices. Exploitation could allow a local attacker or a malicious user-space process (such as wpa_supplicant) to trigger a buffer overflow, potentially leading to memory corruption, denial of service (system crashes), or escalation of privileges if exploited further. This could impact the confidentiality, integrity, and availability of affected systems. Given the widespread use of Linux in enterprise environments, including servers, network devices, and embedded systems, organizations relying on affected hardware for wireless connectivity could face disruptions or compromise. The lack of known exploits reduces immediate risk, but the vulnerability's presence in a core kernel component means that targeted attacks could emerge, especially in sectors with high reliance on secure wireless communications such as finance, telecommunications, and critical infrastructure.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify and inventory all Linux systems using the ath11k driver, especially those with Qualcomm IPQ8074 or similar Wi-Fi chipsets. 2) Apply the latest Linux kernel patches that address CVE-2022-49533 as soon as they become available, ensuring that the driver’s SSID and BSSID limits are correctly aligned with firmware capabilities. 3) Temporarily restrict or monitor the use of wpa_supplicant or other user-space processes that can initiate Wi-Fi scans on critical systems to detect anomalous scanning behavior. 4) Implement strict access controls and sandboxing for user-space processes interacting with wireless drivers to limit potential exploitation vectors. 5) Monitor system logs and kernel messages for signs of buffer overflow or memory corruption events related to wireless scanning. 6) Engage with hardware vendors and Linux distribution maintainers to confirm patch availability and deployment timelines. 7) For embedded or IoT devices using affected hardware, coordinate firmware updates or device replacements where patching is not feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49533: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ath11k: Change max no of active probe SSID and BSSID to fw capability The maximum number of SSIDs in a for active probe requests is currently reported as 16 (WLAN_SCAN_PARAMS_MAX_SSID) when registering the driver. The scan_req_params structure only has the capacity to hold 10 SSIDs. This leads to a buffer overflow which can be triggered from wpa_supplicant in userspace. When copying the SSIDs into the scan_req_params structure in the ath11k_mac_op_hw_scan route, it can overwrite the extraie pointer. Firmware supports 16 ssid * 4 bssid, for each ssid 4 bssid combo probe request will be sent, so totally 64 probe requests supported. So set both max ssid and bssid to 16 and 4 respectively. Remove the redundant macros of ssid and bssid. Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.7.0.1-01300-QCAHKSWPL_SILICONZ-1
AI-Powered Analysis
Technical Analysis
CVE-2022-49533 is a vulnerability identified in the Linux kernel's ath11k wireless driver, specifically related to the handling of active probe requests for Wi-Fi scanning. The issue arises from a mismatch between the maximum number of SSIDs (Service Set Identifiers) reported by the driver and the actual capacity of the data structure used to hold these SSIDs during scanning operations. The driver reports a maximum of 16 SSIDs (WLAN_SCAN_PARAMS_MAX_SSID), but the scan_req_params structure only has capacity for 10 SSIDs. This discrepancy leads to a buffer overflow when the wpa_supplicant user-space process triggers a scan and the SSIDs are copied into the scan_req_params structure within the ath11k_mac_op_hw_scan function. The overflow can overwrite adjacent memory, including the extraie pointer, potentially leading to memory corruption. The firmware supports up to 16 SSIDs and 4 BSSIDs (Basic Service Set Identifiers) per SSID, allowing for a total of 64 probe requests. The fix involves aligning the maximum SSID and BSSID counts with firmware capabilities and removing redundant macros to prevent the buffer overflow. The vulnerability was tested on IPQ8074 hardware with specific firmware versions. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected ath11k wireless driver, particularly those using Qualcomm IPQ8074-based Wi-Fi hardware or similar devices. Exploitation could allow a local attacker or a malicious user-space process (such as wpa_supplicant) to trigger a buffer overflow, potentially leading to memory corruption, denial of service (system crashes), or escalation of privileges if exploited further. This could impact the confidentiality, integrity, and availability of affected systems. Given the widespread use of Linux in enterprise environments, including servers, network devices, and embedded systems, organizations relying on affected hardware for wireless connectivity could face disruptions or compromise. The lack of known exploits reduces immediate risk, but the vulnerability's presence in a core kernel component means that targeted attacks could emerge, especially in sectors with high reliance on secure wireless communications such as finance, telecommunications, and critical infrastructure.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify and inventory all Linux systems using the ath11k driver, especially those with Qualcomm IPQ8074 or similar Wi-Fi chipsets. 2) Apply the latest Linux kernel patches that address CVE-2022-49533 as soon as they become available, ensuring that the driver’s SSID and BSSID limits are correctly aligned with firmware capabilities. 3) Temporarily restrict or monitor the use of wpa_supplicant or other user-space processes that can initiate Wi-Fi scans on critical systems to detect anomalous scanning behavior. 4) Implement strict access controls and sandboxing for user-space processes interacting with wireless drivers to limit potential exploitation vectors. 5) Monitor system logs and kernel messages for signs of buffer overflow or memory corruption events related to wireless scanning. 6) Engage with hardware vendors and Linux distribution maintainers to confirm patch availability and deployment timelines. 7) For embedded or IoT devices using affected hardware, coordinate firmware updates or device replacements where patching is not feasible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.589Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe4377
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 10:09:40 PM
Last updated: 8/17/2025, 1:34:50 PM
Views: 19
Related Threats
CVE-2025-55581: n/a
UnknownCVE-2025-52085: n/a
UnknownCVE-2025-43760: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-55613: n/a
HighCVE-2025-57800: CWE-523: Unprotected Transport of Credentials in advplyr audiobookshelf
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.