CVE-2023-52627: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7091r: Allow users to configure device events AD7091R-5 devices are supported by the ad7091r-5 driver together with the ad7091r-base driver. Those drivers declared iio events for notifying user space when ADC readings fall bellow the thresholds of low limit registers or above the values set in high limit registers. However, to configure iio events and their thresholds, a set of callback functions must be implemented and those were not present until now. The consequence of trying to configure ad7091r-5 events without the proper callback functions was a null pointer dereference in the kernel because the pointers to the callback functions were not set. Implement event configuration callbacks allowing users to read/write event thresholds and enable/disable event generation. Since the event spec structs are generic to AD7091R devices, also move those from the ad7091r-5 driver the base driver so they can be reused when support for ad7091r-2/-4/-8 be added.
AI Analysis
Technical Summary
CVE-2023-52627 is a medium-severity vulnerability identified in the Linux kernel's Industrial I/O (IIO) subsystem, specifically affecting the ad7091r driver family that supports AD7091R-series Analog-to-Digital Converter (ADC) devices. These devices include variants such as ad7091r-5, ad7091r-2, ad7091r-4, and ad7091r-8. The vulnerability arises because the driver previously declared IIO events to notify user space applications when ADC readings crossed configured threshold limits (low or high), but lacked the necessary callback functions to properly configure these events and their thresholds. Attempting to configure these events without the callbacks resulted in a null pointer dereference in the kernel, causing a kernel crash (denial of service). The fix involved implementing the missing event configuration callbacks to allow safe reading, writing, enabling, and disabling of event thresholds. Additionally, event specification structures were moved from the ad7091r-5 specific driver to the base driver to facilitate reuse for other device variants. The vulnerability requires local privileges with low authentication complexity and no user interaction, and it impacts availability by causing kernel crashes. The CVSS v3.1 score is 5.5 (medium), reflecting the limited scope and impact confined to local users with some privileges. No known exploits are reported in the wild as of the publication date (March 26, 2024).
Potential Impact
For European organizations, the impact of CVE-2023-52627 is primarily related to system availability and stability in environments using Linux systems with AD7091R-series ADC hardware. Such ADC devices are typically embedded in industrial control systems, IoT devices, and specialized measurement equipment. Organizations in sectors like manufacturing, energy, automotive, and critical infrastructure that deploy Linux-based embedded systems with these ADCs could experience kernel crashes leading to denial of service, potentially disrupting operational technology (OT) processes or data acquisition workflows. While the vulnerability does not compromise confidentiality or integrity, repeated crashes could cause downtime, data loss, or require system reboots, impacting operational continuity. Since exploitation requires local access with some privileges, the threat is more relevant in environments where multiple users have shell or administrative access or where attackers have already gained limited footholds. European organizations with stringent uptime requirements and those operating critical infrastructure should prioritize patching to avoid service interruptions.
Mitigation Recommendations
1. Apply the official Linux kernel patches that implement the missing event configuration callbacks for the ad7091r driver family as soon as they are available in your distribution or kernel version. 2. For embedded or industrial systems, coordinate with hardware and software vendors to ensure updated firmware or kernel versions are deployed. 3. Restrict local user privileges to minimize the number of users who can configure IIO events or access the affected ADC devices. 4. Monitor system logs for kernel oops or crashes related to the ad7091r driver to detect potential exploitation attempts or misconfigurations. 5. Implement strict access controls and network segmentation to limit local access to critical Linux systems running these drivers. 6. For systems where patching is delayed, consider disabling event configuration features for the ad7091r devices if feasible, to prevent triggering the null pointer dereference. 7. Maintain up-to-date backups and recovery procedures to minimize downtime in case of denial-of-service incidents.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Finland
CVE-2023-52627: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7091r: Allow users to configure device events AD7091R-5 devices are supported by the ad7091r-5 driver together with the ad7091r-base driver. Those drivers declared iio events for notifying user space when ADC readings fall bellow the thresholds of low limit registers or above the values set in high limit registers. However, to configure iio events and their thresholds, a set of callback functions must be implemented and those were not present until now. The consequence of trying to configure ad7091r-5 events without the proper callback functions was a null pointer dereference in the kernel because the pointers to the callback functions were not set. Implement event configuration callbacks allowing users to read/write event thresholds and enable/disable event generation. Since the event spec structs are generic to AD7091R devices, also move those from the ad7091r-5 driver the base driver so they can be reused when support for ad7091r-2/-4/-8 be added.
AI-Powered Analysis
Technical Analysis
CVE-2023-52627 is a medium-severity vulnerability identified in the Linux kernel's Industrial I/O (IIO) subsystem, specifically affecting the ad7091r driver family that supports AD7091R-series Analog-to-Digital Converter (ADC) devices. These devices include variants such as ad7091r-5, ad7091r-2, ad7091r-4, and ad7091r-8. The vulnerability arises because the driver previously declared IIO events to notify user space applications when ADC readings crossed configured threshold limits (low or high), but lacked the necessary callback functions to properly configure these events and their thresholds. Attempting to configure these events without the callbacks resulted in a null pointer dereference in the kernel, causing a kernel crash (denial of service). The fix involved implementing the missing event configuration callbacks to allow safe reading, writing, enabling, and disabling of event thresholds. Additionally, event specification structures were moved from the ad7091r-5 specific driver to the base driver to facilitate reuse for other device variants. The vulnerability requires local privileges with low authentication complexity and no user interaction, and it impacts availability by causing kernel crashes. The CVSS v3.1 score is 5.5 (medium), reflecting the limited scope and impact confined to local users with some privileges. No known exploits are reported in the wild as of the publication date (March 26, 2024).
Potential Impact
For European organizations, the impact of CVE-2023-52627 is primarily related to system availability and stability in environments using Linux systems with AD7091R-series ADC hardware. Such ADC devices are typically embedded in industrial control systems, IoT devices, and specialized measurement equipment. Organizations in sectors like manufacturing, energy, automotive, and critical infrastructure that deploy Linux-based embedded systems with these ADCs could experience kernel crashes leading to denial of service, potentially disrupting operational technology (OT) processes or data acquisition workflows. While the vulnerability does not compromise confidentiality or integrity, repeated crashes could cause downtime, data loss, or require system reboots, impacting operational continuity. Since exploitation requires local access with some privileges, the threat is more relevant in environments where multiple users have shell or administrative access or where attackers have already gained limited footholds. European organizations with stringent uptime requirements and those operating critical infrastructure should prioritize patching to avoid service interruptions.
Mitigation Recommendations
1. Apply the official Linux kernel patches that implement the missing event configuration callbacks for the ad7091r driver family as soon as they are available in your distribution or kernel version. 2. For embedded or industrial systems, coordinate with hardware and software vendors to ensure updated firmware or kernel versions are deployed. 3. Restrict local user privileges to minimize the number of users who can configure IIO events or access the affected ADC devices. 4. Monitor system logs for kernel oops or crashes related to the ad7091r driver to detect potential exploitation attempts or misconfigurations. 5. Implement strict access controls and network segmentation to limit local access to critical Linux systems running these drivers. 6. For systems where patching is delayed, consider disabling event configuration features for the ad7091r devices if feasible, to prevent triggering the null pointer dereference. 7. Maintain up-to-date backups and recovery procedures to minimize downtime in case of denial-of-service incidents.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-03-06T09:52:12.091Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9830c4522896dcbe7124
Added to database: 5/21/2025, 9:09:04 AM
Last enriched: 7/1/2025, 4:57:49 AM
Last updated: 7/28/2025, 9:08:28 PM
Views: 12
Related Threats
CVE-2025-8974: Hard-coded Credentials in linlinjava litemall
MediumCVE-2025-8973: SQL Injection in SourceCodester Cashier Queuing System
MediumCVE-2025-21110: CWE-250: Execution with Unnecessary Privileges in Dell Data Lakehouse
MediumCVE-2025-8972: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-51986: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.