
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2022-2663) was discovered in the Linux kernel's nf_conntrack_irc module, where message handling can be confused and incorrectly matches messages. The issue was found in August 2022 and affects Linux systems with nf_conntrack_irc configured. This vulnerability impacts the netfilter implementation, specifically affecting systems using unencrypted IRC connections through NAT (NVD, CVE).
The vulnerability stems from two main bugs in nf_conntrack_irc: First, the module does not completely match on the IRC protocol, allowing the DCC string to be matched anywhere within the outbound TCP stream instead of only at the start of a message. Second, the external IP address is not checked correctly, as the code incorrectly checks for the IP address of the IRC server instead of the NAT host. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.3 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N (NAT Blog).
When exploited, this vulnerability allows an external user on the same IRC network as an internal user to bypass firewall restrictions, open arbitrary TCP ports in the firewall, reveal users' public IP addresses, or block IRC connections at the firewall level. This is particularly concerning for networks using unencrypted IRC connections with nf_conntrack_irc configured (Debian Advisory).
Several mitigation strategies are available: 1) Use TLS for IRC connections to prevent nf_conntrack_irc from intercepting DCC requests. 2) Remove any iptables rules referencing -m helper --helper irc and unload nf_conntrack_irc. 3) For MikroTik devices, remove IRC from the service ports list. 4) Apply the available kernel patches. Since Linux kernel version 4.6, NAT helpers are not loaded by default and require explicit configuration (NAT Blog, OSS Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."