Cyber Posture

CVE-2022-49740

High

Published: 27 March 2025

Published
27 March 2025
Modified
01 October 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0004 11.1th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2022-49740 is a slab-out-of-bounds read vulnerability in the Linux kernel's brcmfmac WiFi driver, affecting functions brcmf_construct_chaninfo() and brcmf_enable_bw40_2g(). The issue arises when the count value of channel specifications provided by the device exceeds the length of the allocated 'list->element[]' buffer, which is sized based on the kzalloc() allocation in brcmf_setup_wiphybands() or brcmf_cfg80211_attach(). This leads to invalid memory reads, as detected by KASAN in crash reports during device initialization.

A local attacker with low privileges can exploit this vulnerability by connecting a malicious USB device supported by the brcmfmac driver, such as during USB enumeration in the usb_hub_wq workqueue. The malformed channel specification count triggers out-of-bounds reads, potentially allowing high confidentiality impact through memory disclosure and high availability impact via system crashes, with no integrity impact or scope change, as scored by CVSS 3.1 vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H (score 7.1). The vulnerability aligns with CWE-125 (Out-of-bounds Read).

Kernel patch commits referenced in advisories, such as those at git.kernel.org/stable/c/4920ab131b2dbae7464b72bdcac465d070254209 and others, mitigate the issue by adding checks in the affected functions to free the buffer and return -EINVAL if the count exceeds the allocated size. Callers like brcmf_setup_wiphybands() and brcmf_cfg80211_attach() handle the negative return appropriately. Systems should update to kernels including these stable backports.

The vulnerability was discovered by a modified version of the syzkaller fuzzer, with no evidence of real-world exploitation reported.

Details

CWE(s)
CWE-125

Affected Products

linux
linux kernel
≤ 5.4.232 · 5.5 — 5.10.168 · 5.11 — 5.15.93

MITRE ATT&CK Enterprise Techniques

T1200 Hardware Additions Initial Access
Adversaries may physically introduce computer accessories, networking hardware, or other computing devices into a system or network that can be used as a vector to gain access.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The vulnerability is exploited by connecting a malicious USB device (T1200) and leads to system crashes enabling denial of service (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References