Cyber Posture

CVE-2022-49737

High

Published: 16 March 2025

Published
16 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
EPSS Score 0.0009 26.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2022-49737 is a high-severity Improper Resource Locking (CWE-413) vulnerability in Debian (inferred from references). Its CVSS base score is 7.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 26.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and CM-2 (Baseline Configuration).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation directly mitigates CVE-2022-49737 by applying the upstream patch that acquires the input lock during AttachDevice operations in the X.Org X server.

detect

Vulnerability monitoring and scanning identifies the presence of vulnerable X.Org X server versions (20.11 through 21.1.16) affected by the race condition.

prevent

Baseline configuration ensures only patched X.Org X server versions beyond 21.1.16 are deployed, preventing use of vulnerable instances susceptible to the race condition.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Race condition in X.Org X server input handling (AttachDevice) enables exploitation to crash the server or disrupt input, directly mapping to application/system exploitation for endpoint DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in…

more

dix/devices.c does not acquire an input lock.

Deeper analysisAI

CVE-2022-49737 is a race condition vulnerability in the X.Org X server versions 20.11 through 21.1.16. It occurs when a client application uses the easystroke tool for mouse gestures, during which the main thread modifies data structures used by the input thread without acquiring an input lock. Specifically, the AttachDevice function in dix/devices.c fails to acquire this lock, leading to potential concurrent access issues. The vulnerability is classified under CWE-413 (Logic Error) with a CVSS v3.1 base score of 7.7 (AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H).

An attacker with low privileges (PR:L) can exploit this over the network (AV:N), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation changes scope (S:C), allowing limited confidentiality and integrity impacts (C:L/I:L) alongside high availability impact (A:H), such as crashing the X server or disrupting input handling through manipulated device attachments.

Mitigation involves applying patches that ensure the input lock is held during AttachDevice operations, as detailed in the referenced Debian bug report (bug 1081338) and its attached patch (dix-Hold-input-lock-for-AttachDevice.patch). The upstream fix is committed in the X.Org X server GitLab repository at dc7cb45482cea6ccec22d117ca0b489500b4d0a0, addressing the issue reported in GitLab issue 1260. Security practitioners should update to patched X server versions beyond 21.1.16.

Details

CWE(s)

Affected Products

Debian
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-32748Shared CWE-413

References