The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-3577

CVE-2022-3577: Linux Kernel Privilege Escalation Flaw

CVE-2022-3577 is a privilege escalation flaw in the Linux Kernel's HID driver that allows local attackers to crash the system or gain elevated privileges. This article covers technical details, affected versions, and fixes.

Published: February 11, 2026

CVE-2022-3577 Overview

An out-of-bounds memory write vulnerability has been identified in the Linux kernel's Kid-friendly Wired Controller driver (BigBen). This flaw exists in the bigben_probe function within drivers/hid/hid-bigbenff.c and stems from an incorrect assumption that all BigBen devices have inputs. A local attacker can exploit this vulnerability by connecting a malicious device that breaks this assumption, leading to out-of-bounds memory writes that can crash the system or potentially escalate privileges.

Critical Impact

Local users can crash the system or potentially escalate their privileges by exploiting an out-of-bounds write condition triggered by malicious USB HID devices.

Affected Products

  • Linux Kernel (multiple versions affected)
  • Linux Kernel 5.19-rc1
  • Systems with BigBen HID driver enabled (hid-bigbenff.c)

Discovery Timeline

  • 2022-10-20 - CVE CVE-2022-3577 published to NVD
  • 2025-05-08 - Last updated in NVD database

Technical Details for CVE-2022-3577

Vulnerability Analysis

This vulnerability is classified as CWE-787 (Out-of-bounds Write) and CWE-401 (Missing Release of Memory after Effective Lifetime). The flaw resides in the BigBen HID driver's probe function, which handles device initialization when a BigBen-compatible game controller is connected to the system.

The root cause is a flawed assumption in the driver code that all BigBen devices will have valid input endpoints. When a malicious or malformed USB HID device is connected that claims to be a BigBen controller but lacks expected input structures, the driver proceeds without proper validation. This leads to memory operations being performed on uninitialized or invalid memory regions.

Since the attack requires local access (physical connection of a malicious USB device or equivalent access), exploitation requires an attacker to either have physical access to the target machine or to trick a user into connecting a malicious device. Once triggered, the out-of-bounds write can corrupt adjacent kernel memory, potentially allowing arbitrary code execution in kernel context.

Root Cause

The vulnerability stems from insufficient input validation in the bigben_probe() function. The driver assumes all devices matching the BigBen HID descriptor will have valid input endpoints configured. When a device violates this assumption by presenting incomplete or malformed descriptors, the driver continues execution with invalid or uninitialized pointers, resulting in out-of-bounds memory writes during the device initialization sequence.

Attack Vector

The attack requires local access to the system. An attacker must connect a specially crafted USB HID device that mimics a BigBen controller but provides malformed or missing input endpoint data. When the kernel's HID subsystem loads the BigBen driver for this malicious device, the bigben_probe() function executes without proper validation, triggering the out-of-bounds write condition.

The vulnerability manifests during device probe initialization in the HID driver subsystem. The specific flaw occurs when the driver attempts to access input device structures that don't exist or are improperly initialized. For technical details on the exact code paths involved, refer to the Linux Kernel Commit Change.

Detection Methods for CVE-2022-3577

Indicators of Compromise

  • Unexpected kernel panic or oops messages referencing hid-bigbenff or bigben_probe
  • Suspicious USB device connection events for devices identifying as BigBen controllers
  • Kernel log entries showing memory corruption or invalid memory access in HID subsystem
  • Unusual privilege escalation attempts following USB device connections

Detection Strategies

  • Monitor dmesg and kernel logs for error messages related to hid-bigbenff.c or the BigBen driver module
  • Implement USB device whitelisting to prevent unauthorized HID devices from being probed
  • Use Linux audit subsystem to track USB device connections and HID driver loading events
  • Deploy endpoint detection solutions capable of monitoring kernel-level anomalies

Monitoring Recommendations

  • Enable kernel auditing for module loading events, specifically for HID-related drivers
  • Configure alerts for unexpected USB device enumeration, particularly devices claiming BigBen vendor/product IDs
  • Monitor for kernel memory corruption indicators such as SLUB/SLAB debugging warnings
  • Implement SentinelOne's kernel-level monitoring to detect privilege escalation attempts following driver exploitation

How to Mitigate CVE-2022-3577

Immediate Actions Required

  • Update the Linux kernel to a patched version that includes the security fix
  • If unable to update immediately, consider blacklisting the hid-bigbenff module if BigBen controllers are not required
  • Restrict physical access to USB ports on critical systems
  • Implement USB device authorization policies to prevent untrusted devices from being recognized

Patch Information

The Linux kernel development team has released patches to address this vulnerability. The fix adds proper validation to ensure input endpoints exist before attempting to access them in the bigben_probe() function.

Multiple commits address this issue:

  • Linux Kernel Commit Update - char-misc-next branch fix
  • Linux Kernel Commit Change - Main kernel fix
  • Linux Kernel Commit Modification - Additional fix

Workarounds

  • Blacklist the vulnerable driver module by adding blacklist hid-bigbenff to /etc/modprobe.d/blacklist.conf
  • Disable USB device auto-probing for untrusted systems using USBGuard or similar tools
  • Implement strict physical security controls to prevent unauthorized USB device connections
  • Use kernel command line parameters to disable specific HID drivers if not needed
bash
# Blacklist the vulnerable BigBen HID driver module
echo "blacklist hid-bigbenff" | sudo tee /etc/modprobe.d/blacklist-bigben.conf

# Prevent module from loading (requires reboot)
sudo update-initramfs -u

# Alternatively, remove the module if currently loaded
sudo modprobe -r hid-bigbenff

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-401

  • CWE-787
  • Vendor Resources
  • Linux Kernel Commit Update

  • Linux Kernel Commit Change

  • Linux Kernel Commit Modification
  • Related CVEs
  • CVE-2026-31411: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-23438: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-23439: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-23437: Linux Kernel Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English