CVE-2022-2663
Linux Kernel vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2022-2663) was discovered in the Linux kernel's nf_conntrack_irc module, where message handling can be confused and incorrectly matches messages. The issue was found in August 2022 and affects Linux systems with nf_conntrack_irc configured. This vulnerability impacts the netfilter implementation, specifically affecting systems using unencrypted IRC connections through NAT (NVD, CVE).

Technical details

The vulnerability stems from two main bugs in nf_conntrack_irc: First, the module does not completely match on the IRC protocol, allowing the DCC string to be matched anywhere within the outbound TCP stream instead of only at the start of a message. Second, the external IP address is not checked correctly, as the code incorrectly checks for the IP address of the IRC server instead of the NAT host. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.3 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N (NAT Blog).

Impact

When exploited, this vulnerability allows an external user on the same IRC network as an internal user to bypass firewall restrictions, open arbitrary TCP ports in the firewall, reveal users' public IP addresses, or block IRC connections at the firewall level. This is particularly concerning for networks using unencrypted IRC connections with nf_conntrack_irc configured (Debian Advisory).

Mitigation and workarounds

Several mitigation strategies are available: 1) Use TLS for IRC connections to prevent nf_conntrack_irc from intercepting DCC requests. 2) Remove any iptables rules referencing -m helper --helper irc and unload nf_conntrack_irc. 3) For MikroTik devices, remove IRC from the service ports list. 4) Apply the available kernel patches. Since Linux kernel version 4.6, NAT helpers are not loaded by default and require explicit configuration (NAT Blog, OSS Security).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules-core
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-doc
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-abi-stablelists
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management