Skip to main content

CVE-2023-22995: n/a in n/a

High
VulnerabilityCVE-2023-22995cvecve-2023-22995
Published: Tue Feb 28 2023 (02/28/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.

AI-Powered Analysis

AILast updated: 07/03/2025, 12:25:34 UTC

Technical Analysis

CVE-2023-22995 is a high-severity vulnerability affecting the Linux kernel versions prior to 5.17. The issue resides in the error handling path of the function dwc3_qcom_acpi_register_core within the USB driver located at drivers/usb/dwc3/dwc3-qcom.c. Specifically, the vulnerability arises because certain cleanup calls—platform_device_put and kfree—are omitted during error handling. These functions are responsible for releasing platform device references and freeing allocated memory, respectively. The absence of these calls can lead to resource leaks, which under certain conditions may be exploited to cause a denial of service (DoS) or potentially escalate privileges by corrupting kernel memory management. The CVSS 3.1 base score of 7.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, requiring local privileges (PR:L) but no user interaction (UI:N). The attack vector is local (AV:L), meaning an attacker must have some level of access to the system to exploit this flaw. Although no known exploits are currently reported in the wild, the vulnerability's nature in a critical kernel component handling USB device registration on Qualcomm platforms makes it a significant risk, especially for devices using affected kernel versions. The lack of patch links suggests that users should monitor Linux kernel updates closely and apply patches once available.

Potential Impact

For European organizations, this vulnerability poses a notable risk primarily to systems running Linux kernels prior to version 5.17, especially those deployed on Qualcomm-based hardware utilizing the DWC3 USB controller. The potential impacts include system instability due to resource leaks, which can degrade availability or cause crashes. More critically, if exploited, it could allow local attackers to escalate privileges, compromising system confidentiality and integrity. This is particularly concerning for organizations relying on Linux-based infrastructure in sensitive environments such as telecommunications, embedded systems, or industrial control systems where Qualcomm chipsets are prevalent. The vulnerability could also affect endpoint devices, servers, or IoT devices, potentially leading to broader network compromise if attackers gain elevated privileges. Given the local attack vector, insider threats or compromised user accounts could leverage this vulnerability to deepen their access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge. European organizations with strict regulatory requirements around data protection and system integrity must prioritize addressing this vulnerability to avoid compliance issues and operational disruptions.

Mitigation Recommendations

To mitigate CVE-2023-22995 effectively, European organizations should: 1) Identify and inventory all Linux systems running kernel versions prior to 5.17, focusing on those with Qualcomm-based USB controllers. 2) Monitor official Linux kernel repositories and vendor advisories for patches addressing this vulnerability and apply them promptly once available. 3) In the interim, restrict local access to affected systems by enforcing strict user privilege management and limiting shell or console access to trusted personnel only. 4) Employ kernel hardening techniques such as SELinux or AppArmor to constrain the impact of potential exploits. 5) Conduct regular system integrity checks and monitor logs for unusual kernel or USB subsystem errors that may indicate exploitation attempts. 6) For embedded or IoT devices where kernel upgrades may be challenging, consider network segmentation and additional endpoint security controls to reduce exposure. 7) Engage with hardware and software vendors to confirm patch availability and support timelines, ensuring timely remediation in supply chain devices. These targeted actions go beyond generic advice by focusing on the specific affected component, attack vector, and operational context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-01-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc4b2

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:25:34 PM

Last updated: 8/17/2025, 10:48:12 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats