Skip to main content

CVE-2023-30772: n/a in n/a

Medium
VulnerabilityCVE-2023-30772cvecve-2023-30772
Published: Sun Apr 16 2023 (04/16/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.

AI-Powered Analysis

AILast updated: 07/07/2025, 00:40:56 UTC

Technical Analysis

CVE-2023-30772 is a vulnerability identified in the Linux kernel versions prior to 6.2.9, specifically within the power supply driver for the DA9150 charger (drivers/power/supply/da9150-charger.c). The flaw is a race condition that leads to a use-after-free (CWE-416) scenario. This occurs when a physically proximate attacker unplugs a device, triggering a timing issue in the kernel's handling of the charger driver. The race condition allows the attacker to cause the kernel to access memory that has already been freed, potentially leading to arbitrary code execution or kernel memory corruption. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The vector metrics specify that the attack requires physical proximity (AV:P), high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no vendor or product-specific details beyond the Linux kernel and the DA9150 charger driver are provided. The vulnerability is significant because kernel-level flaws can compromise the entire system, allowing attackers to escalate privileges or cause denial of service. However, exploitation requires physical access to the device, limiting the attack surface primarily to environments where an attacker can physically interact with the hardware.

Potential Impact

For European organizations, the impact of CVE-2023-30772 depends on their use of Linux-based systems with the affected kernel versions and hardware utilizing the DA9150 charger driver. Organizations relying on embedded Linux devices, IoT equipment, or specialized hardware in industrial or operational technology environments may be particularly at risk. Successful exploitation could lead to full system compromise, data breaches, or disruption of critical services. The requirement for physical proximity reduces the likelihood of remote exploitation but raises concerns for environments with shared physical access, such as data centers, offices, or manufacturing floors. Confidentiality, integrity, and availability are all at risk, potentially affecting sensitive data and operational continuity. European organizations in sectors like manufacturing, telecommunications, and critical infrastructure that deploy Linux-based embedded systems should be vigilant. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

To mitigate CVE-2023-30772, European organizations should: 1) Update Linux kernels to version 6.2.9 or later where the vulnerability is patched. 2) Identify and inventory devices running affected kernel versions and using the DA9150 charger driver to prioritize patching. 3) Restrict physical access to critical systems and devices, implementing strict access controls and monitoring to prevent unauthorized unplugging or hardware manipulation. 4) Employ hardware security measures such as tamper-evident seals or locked enclosures for devices in sensitive environments. 5) Monitor system logs and kernel messages for unusual behavior indicative of exploitation attempts. 6) Coordinate with hardware vendors and Linux distribution maintainers for timely updates and advisories. 7) Consider deploying kernel hardening features and security modules that can mitigate use-after-free exploitation vectors. These steps go beyond generic advice by focusing on physical security and targeted patch management for embedded Linux systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-04-16T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc649

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:40:56 AM

Last updated: 8/12/2025, 10:01:28 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats