
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-25375 was discovered in the Linux kernel's RNDIS USB gadget implementation. The vulnerability was reported on February 20, 2022, affecting the Linux kernel versions before 5.16.10. The issue exists in the drivers/usb/gadget/function/rndis.c file where the RNDIS USB gadget lacks validation of the size of the RNDISMSGSET command (NVD, MITRE).
The vulnerability stems from the RNDISMSGSET handler (rndissetresponse) which calls genndissetresp passing a buffer pointer offset by BufOffset + 8. The BufOffset variable is retrieved from the RNDIS message but not validated to respect buffer boundaries. By manipulating the four-byte InformationBufferOffset member of rndissetmsgtype, an attacker can offset the actual buffer by up to 0xffffffff bytes (OSS-Security).
The vulnerability allows attackers to obtain sensitive information from kernel memory. When exploited, attackers can extract up to 0xffffffff bytes of kernel space memory by two bytes at a time. While the process is relatively slow, it remains effective in extracting sensitive kernel data (GitHub-POC).
The vulnerability was patched in Linux kernel version 5.16.10 by adding size validation checks for the RNDISMSGSET command. The fix includes checking if BufLength exceeds RNDISMAXTOTALSIZE or if BufOffset + 8 is greater than or equal to RNDISMAXTOTALSIZE (Linux-Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."