CVE-2023-30772: n/a in n/a
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.
AI Analysis
Technical Summary
CVE-2023-30772 is a vulnerability identified in the Linux kernel versions prior to 6.2.9, specifically within the power supply driver for the DA9150 charger (drivers/power/supply/da9150-charger.c). The flaw is a race condition that leads to a use-after-free (CWE-416) scenario. This occurs when a physically proximate attacker unplugs a device, triggering a timing issue in the kernel's handling of the charger driver. The race condition allows the attacker to cause the kernel to access memory that has already been freed, potentially leading to arbitrary code execution or kernel memory corruption. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The vector metrics specify that the attack requires physical proximity (AV:P), high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no vendor or product-specific details beyond the Linux kernel and the DA9150 charger driver are provided. The vulnerability is significant because kernel-level flaws can compromise the entire system, allowing attackers to escalate privileges or cause denial of service. However, exploitation requires physical access to the device, limiting the attack surface primarily to environments where an attacker can physically interact with the hardware.
Potential Impact
For European organizations, the impact of CVE-2023-30772 depends on their use of Linux-based systems with the affected kernel versions and hardware utilizing the DA9150 charger driver. Organizations relying on embedded Linux devices, IoT equipment, or specialized hardware in industrial or operational technology environments may be particularly at risk. Successful exploitation could lead to full system compromise, data breaches, or disruption of critical services. The requirement for physical proximity reduces the likelihood of remote exploitation but raises concerns for environments with shared physical access, such as data centers, offices, or manufacturing floors. Confidentiality, integrity, and availability are all at risk, potentially affecting sensitive data and operational continuity. European organizations in sectors like manufacturing, telecommunications, and critical infrastructure that deploy Linux-based embedded systems should be vigilant. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
To mitigate CVE-2023-30772, European organizations should: 1) Update Linux kernels to version 6.2.9 or later where the vulnerability is patched. 2) Identify and inventory devices running affected kernel versions and using the DA9150 charger driver to prioritize patching. 3) Restrict physical access to critical systems and devices, implementing strict access controls and monitoring to prevent unauthorized unplugging or hardware manipulation. 4) Employ hardware security measures such as tamper-evident seals or locked enclosures for devices in sensitive environments. 5) Monitor system logs and kernel messages for unusual behavior indicative of exploitation attempts. 6) Coordinate with hardware vendors and Linux distribution maintainers for timely updates and advisories. 7) Consider deploying kernel hardening features and security modules that can mitigate use-after-free exploitation vectors. These steps go beyond generic advice by focusing on physical security and targeted patch management for embedded Linux systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2023-30772: n/a in n/a
Description
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.
AI-Powered Analysis
Technical Analysis
CVE-2023-30772 is a vulnerability identified in the Linux kernel versions prior to 6.2.9, specifically within the power supply driver for the DA9150 charger (drivers/power/supply/da9150-charger.c). The flaw is a race condition that leads to a use-after-free (CWE-416) scenario. This occurs when a physically proximate attacker unplugs a device, triggering a timing issue in the kernel's handling of the charger driver. The race condition allows the attacker to cause the kernel to access memory that has already been freed, potentially leading to arbitrary code execution or kernel memory corruption. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The vector metrics specify that the attack requires physical proximity (AV:P), high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no vendor or product-specific details beyond the Linux kernel and the DA9150 charger driver are provided. The vulnerability is significant because kernel-level flaws can compromise the entire system, allowing attackers to escalate privileges or cause denial of service. However, exploitation requires physical access to the device, limiting the attack surface primarily to environments where an attacker can physically interact with the hardware.
Potential Impact
For European organizations, the impact of CVE-2023-30772 depends on their use of Linux-based systems with the affected kernel versions and hardware utilizing the DA9150 charger driver. Organizations relying on embedded Linux devices, IoT equipment, or specialized hardware in industrial or operational technology environments may be particularly at risk. Successful exploitation could lead to full system compromise, data breaches, or disruption of critical services. The requirement for physical proximity reduces the likelihood of remote exploitation but raises concerns for environments with shared physical access, such as data centers, offices, or manufacturing floors. Confidentiality, integrity, and availability are all at risk, potentially affecting sensitive data and operational continuity. European organizations in sectors like manufacturing, telecommunications, and critical infrastructure that deploy Linux-based embedded systems should be vigilant. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
To mitigate CVE-2023-30772, European organizations should: 1) Update Linux kernels to version 6.2.9 or later where the vulnerability is patched. 2) Identify and inventory devices running affected kernel versions and using the DA9150 charger driver to prioritize patching. 3) Restrict physical access to critical systems and devices, implementing strict access controls and monitoring to prevent unauthorized unplugging or hardware manipulation. 4) Employ hardware security measures such as tamper-evident seals or locked enclosures for devices in sensitive environments. 5) Monitor system logs and kernel messages for unusual behavior indicative of exploitation attempts. 6) Coordinate with hardware vendors and Linux distribution maintainers for timely updates and advisories. 7) Consider deploying kernel hardening features and security modules that can mitigate use-after-free exploitation vectors. These steps go beyond generic advice by focusing on physical security and targeted patch management for embedded Linux systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-04-16T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc649
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 12:40:56 AM
Last updated: 8/12/2025, 10:01:28 AM
Views: 11
Related Threats
CVE-2025-8933: Cross Site Scripting in 1000 Projects Sales Management System
MediumCVE-2025-8932: SQL Injection in 1000 Projects Sales Management System
MediumCVE-2025-8931: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8930: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-50610: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.