{"vulnerability": "cve-2022-32250", "sightings": [{"uuid": "fafe369b-2249-4472-b466-f15b719217c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2655", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-32250 - Working Proof of Concept &amp; Patch\nURL\uff1ahttps://github.com/0dayCTF/CVE-2022-32250_PoC\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-07-06T16:33:44.000000Z"}, {"uuid": "45958d71-3d5d-424b-afca-b8edde8923f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/cKure/10147", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Exploiting a limited UAF in nf_tables (CVE-2022-32250).\n\nhttps://research.nccgroup.com/2022/09/01/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250/", "creation_timestamp": "2022-09-01T19:38:00.000000Z"}, {"uuid": "38786b4c-6e87-4313-a792-319040d9f86a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/cKure/10112", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Linux Kernel Exploit (CVE-2022-32250) with mqueue.\n\nhttps://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/", "creation_timestamp": "2022-08-25T07:50:17.000000Z"}, {"uuid": "a5281fc3-1428-4716-9cfe-82b39b4381e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/42463", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aReproduce CVE-2022-32250 and CVE-2025-21756 by tampering with modprobe_path and hijacking control flow, respectively.\nURL\uff1ahttps://github.com/KuanKuanQAQ/cve-testing\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-30T06:53:06.000000Z"}, {"uuid": "116bf85f-89cc-41a5-ba80-038391911f43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/120", "content": "Top Security News for 02/09/2022\n\nChina-Linked APT40 Gang Targets Wind Farms, Australian Government\nhttps://packetstormsecurity.com/news/view/33791/China-Linked-APT40-Gang-Targets-Wind-Farms-Australian-Government.html \n\nApple releases security update for iPhones and iPads to address vulnerability\nhttps://www.malwarebytes.com/blog/news/2022/09/apple-releases-security-update-for-iphones-and-ipads-to-address-vulnerability \n\nResearchers analyzed a new JavaScript skimmer used by Magecart threat actors\nhttps://securityaffairs.co/wordpress/135177/cyber-crime/javascript-skimmer-magecart.html \n\nRemediant wants to move beyond PAM to secure enterprise networks\nhttps://www.csoonline.com/article/3672233/remediant-wants-to-move-beyond-pam-to-secure-enterprise-networks.html#tk.rss_all \n\nBrandPost: Getting to Know the CIS Benchmarks\nhttps://www.csoonline.com/article/3671351/getting-to-know-the-cis-benchmarks.html#tk.rss_all \n\nSource Code Management Attack Toolkit - Supports GitHub Enterprise, GitLab Enterprise, &amp; Bitbucket Server\nhttps://www.reddit.com/r/netsec/comments/x3s1mm/source_code_management_attack_toolkit_supports/ \n\n2022-08-31 - IcedID (Bokbot) with Cobalt Strike\nhttps://malware.news/t/2022-08-31-icedid-bokbot-with-cobalt-strike/63079/1 \n\nSETTLERS OF NETLINK: Exploiting a limited Use After Free in nf_tables (CVE-2022-32250) against the latest Ubuntu (22.04) and Linux kernel 5.15 -\nhttps://www.reddit.com/r/netsec/comments/x32qyf/settlers_of_netlink_exploiting_a_limited_use/ \n\nUkrainian Video Game Studio Offers Fans Chance to Write Message on Artillery Shell\nhttps://www.vice.com/en_us/article/bvm7g4/ukrainian-video-game-studio-offers-fans-chance-to-write-message-on-artillery-shell \n\nISC Stormcast For Friday, September 2nd, 2022 https://isc.sans.edu/podcastdetail.html?id=8158, (Fri, Sep 2nd)\nhttps://isc.sans.edu/diary/rss/29008 \n\n    \nFollow Top Cyber News at https://t.me/TopCyberTechNews\nFeel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2022-09-02T07:00:09.000000Z"}, {"uuid": "a4c3e0de-cdb1-4eec-ab3c-bf0d948cf333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/200", "content": "Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg\n\nSergi Martinez published an article about exploiting CVE-2022-32250, a slab use-after-free in the netfilter subsystem. Unlike the existing public exploits for this bug, Sergi's exploit targets the kernel version 5.18.1, where both the vulnerable object and msg_msg are allocated in kmalloc-cg-* slab caches.", "creation_timestamp": "2022-12-23T17:04:51.000000Z"}, {"uuid": "ce416a85-cde0-49c2-932d-fba9b53ec888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "seen", "source": "https://t.me/poxek/2378", "content": "#Linux #CVE\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0434\u0440\u0430 Linux Privilege Escalation \nCVE-2022-32250\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 nft_expr_init (net/netfilter/nf_tables_api.c) \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 Netfilter \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0443\u0440\u043e\u0432\u043d\u044f root", "creation_timestamp": "2022-08-27T09:00:04.000000Z"}, {"uuid": "e7bde25d-85e9-46da-ad4d-cd33cd65f3bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "seen", "source": "https://t.me/poxek/2423", "content": "#CVE\n\nExploit for Use After Free in Linux Linux Kernel\nCVE-2022-32250\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 nft_expr_init (net/netfilter/nf_tables_api.c) \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 Netfilter \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0443\u0440\u043e\u0432\u043d\u044f root", "creation_timestamp": "2022-09-01T15:00:04.000000Z"}, {"uuid": "49e8df30-2eac-4852-850b-50c1b1ec2671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/188", "content": "SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250)\n\nA detailed write-up by Cedric Halbronn, Alex Plaskett, and Fidgeting Bits about exploiting a slab use-after-free bug in the netfilter subsystem.", "creation_timestamp": "2022-09-06T02:08:10.000000Z"}, {"uuid": "dba8cc62-5c49-4a44-8395-9388a233cdaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/945", "content": "CVE-2022-32250\nLinux-Kernel-LPE\ndemo video here\nexploit\n\n#exploit #linux # lpe", "creation_timestamp": "2022-08-25T07:18:28.000000Z"}, {"uuid": "62b7bec8-72e8-4ae8-8aeb-d5eaa548e850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "seen", "source": "Telegram/TXmZ8EBGvdc4uufvEqu6hfgyjEc7K_gjD1Jpp8Uzvu6-KK0", "content": "", "creation_timestamp": "2023-03-23T09:18:19.000000Z"}, {"uuid": "e17c29bf-e33b-48e2-90d0-78a779f2c2ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "Telegram/XY-c9YQXr7u9EVWhYCsexlHBnOI6HumSC95UKwi9WXg3Jw", "content": "", "creation_timestamp": "2023-10-24T19:33:26.000000Z"}, {"uuid": "0d0b2846-6b76-4a5e-b8fe-0dfff7485b74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "Telegram/GRsRXaaGl3m37HQZ1Tz5o0jhpZFIOixO9MZcVEUvnNpfoxk", "content": "", "creation_timestamp": "2022-09-08T10:25:14.000000Z"}, {"uuid": "d1d9449c-8882-4a89-8c95-e1c268539f3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/491", "content": "\u200b\u200bCVE-2022-2639 &amp; -/-/32250 : Linux kernel &lt;= 5.13 openvswitch local privilege escalation Using pipe-primitive &amp; Linux Kernel LPE &lt;=5.18.1 - local user to escalate privileges to root\nRepo : https://github.com/veritas501/CVE-2022-2639-PipeVersion\nRepo : https://github.com/theori-io/CVE-2022-32250-exploit", "creation_timestamp": "2022-09-30T06:30:07.000000Z"}, {"uuid": "a8fb8a8a-0d9b-41e0-83e1-ed100fee90ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1895", "content": "\ud83d\udd25Linux Kernel: Exploiting a Netfilter UAF in kmalloc-cg\n\nWe describe a method to exploit a UAF in the Linux kernel when objects are allocated in a specific slab cache, namely the kmalloc-cg series of SLUB caches used for cgroups. This vulnerability is assigned CVE-2022-32250 and exists in Linux kernel versions 5.18.1 and prior.", "creation_timestamp": "2022-12-20T06:03:00.000000Z"}, {"uuid": "6d845282-cdc0-4593-b38d-62441b57cbc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6714", "content": "#exploit\n1. CVE-2022-26113:\nFortiClient Arbitrary File Write As SYSTEM\nhttps://rhinosecuritylabs.com/research/cve-2022-26113-forticlient-arbitrary-file-write-as-system\n\n2. CVE-2022-32250:\nLinux/Ubuntu Kernel LPE\nhttps://github.com/theori-io/CVE-2022-32250-exploit", "creation_timestamp": "2022-09-01T11:03:01.000000Z"}, {"uuid": "7cad6af3-5e99-4672-ad36-e270d946bad4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "seen", "source": "https://t.me/cibsecurity/43781", "content": "\u203c CVE-2022-32250 \u203c\n\nnet/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-03T00:25:55.000000Z"}, {"uuid": "db4d61e9-d606-4597-8b54-30833b9ce118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32250", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/3737", "content": "Linux Kernel Exploit (CVE-2022-32250) with mqueue.\n\nLink\n\nGithub \n\n#Exploit #linux\n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2022-11-12T16:31:21.000000Z"}]}