
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49654 affects the Linux kernel's DSA (Distributed Switch Architecture) QCA8K driver. The vulnerability was discovered in the documentation's lack of crucial information regarding the correct procedure for changing the MAXFRAMESIZE of the switch. When the MAXFRAMESIZE is modified while the CPU port is active, the switch panics and stops sending packets, causing the management ethernet system to become unreachable (Kernel Git).
The vulnerability occurs in the net/dsa/qca8k.c driver when changing the MTU (Maximum Transmission Unit) settings. If the MAXFRAMESIZE is modified without first disabling the CPU ports, the switch enters a panic state and ceases packet transmission. While the slow fallback mechanism continues to function, the device becomes effectively unreachable through normal network operations (Kernel Git).
When exploited, this vulnerability causes the management ethernet system to stop receiving packets, effectively making the device unreachable through normal network operations. A switch reset is required to recover from this state (Kernel Git).
The fix involves modifying the MTU change procedure to properly handle the CPU ports. The correct procedure is to turn off the CPU ports before changing the MAXFRAMESIZE and turn them back on after the value is applied. This fix has been implemented in the kernel source code (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."