CVE-2022-28199
Rocky Linux vulnerability analysis and mitigation

Overview

NVIDIA's Data Plane Development Kit (MLNXDPDK) was found to contain a vulnerability (CVE-2022-28199) in its network stack where error recovery is not handled properly. The vulnerability was initially disclosed on August 29, 2022, affecting MLNXDPDK versions from mlnxdpdk19.111.. through mlnxdpdk20.111.0.0-4.. on both Linux and Windows operating systems (NVIDIA Security).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 6.5 with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating a network-accessible vulnerability with low attack complexity and requiring low privileges. The weakness type is classified as CWE-20 Improper Input Validation (NVIDIA Security).

Impact

When exploited, this vulnerability can allow a remote attacker to cause denial of service (DoS) conditions and potentially impact data integrity and confidentiality. In specific cases, such as with Cisco Catalyst 8000V Edge Software, the device may either reload or fail to receive traffic, resulting in a denial of service condition (Cisco Advisory).

Mitigation and workarounds

NVIDIA has released a software update to address this vulnerability, with the fixed version being mlnxdpdk20.115.0.0. Users are advised to contact their NVIDIA representative to obtain the updated version. For affected Cisco Catalyst 8000V Edge Software, a temporary recovery mechanism exists through the shut/no shut interface commands ([NVIDIA Security](https://nvidia.custhelp.com/app/answers/detail/aid/5389), Cisco Advisory).

Community reactions

Several major vendors have responded to this vulnerability. Palo Alto Networks evaluated the vulnerability and determined that while their VM-Series firewalls use the affected NVIDIA DPDK module on PAN-OS 10.1 and later versions, there are no scenarios that enable successful exploitation in their PAN-OS software (Palo Alto).

Additional resources


SourceThis report was generated using AI

Related Rocky Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13020HIGH8.8
  • NixOSNixOS
  • thunderbird
NoYesNov 11, 2025
CVE-2025-59088HIGH8.6
  • Rocky LinuxRocky Linux
  • idm:DL1::python3-custodia
NoYesNov 12, 2025
CVE-2025-13019HIGH8.1
  • NixOSNixOS
  • MozillaThunderbird-translations-common
NoYesNov 11, 2025
CVE-2025-59089MEDIUM5.9
  • Rocky LinuxRocky Linux
  • idm:client::python3-yubico
NoYesNov 12, 2025
CVE-2025-40185N/AN/A
  • Linux KernelLinux Kernel
  • bpftool
NoYesNov 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management