Out-Of-Bound Indexing Vulnerability in Linux Kernel Affecting Network Scheduling
CVE-2025-21692

7.8HIGH

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
10 February 2025

Badges

📈 Score: 896👾 Exploit Exists🟡 Public PoC

What is CVE-2025-21692?

CVE-2025-21692 is a vulnerability found in the Linux kernel, specifically affecting the network scheduling component. This flaw relates to an out-of-bound indexing issue in the function ets_class_from_arg(), which can be exploited when the clid parameter is improperly set to 0. Such an exploit can lead to a local privilege escalation, allowing attackers to gain unauthorized access to system resources or privileges that would normally be restricted. This vulnerability poses a significant risk to organizations that rely on the Linux kernel for their operations, as successful exploitation could compromise the integrity and confidentiality of their systems.

Potential impact of CVE-2025-21692

  1. Local Privilege Escalation: The primary risk associated with this vulnerability is the ability to escalate privileges locally. Attackers could potentially exploit this flaw to gain higher-level access to the system, allowing them to perform actions that are normally restricted, such as modifying system files or configurations.

  2. System Compromise: Exploiting CVE-2025-21692 could allow malicious actors to compromise the entire system. With escalated privileges, they could install malware, manipulate data, or establish persistent access, all of which could lead to further exploitation or attacks.

  3. Potential for Ransomware Deployment: While specific ransomware groups have not been identified in relation to this vulnerability, the nature of the exploit allows for the possibility of deploying ransomware on compromised systems. This could significantly affect organizations by encrypting critical data and demanding ransoms for recovery, leading to substantial operational and financial consequences.

Affected Version(s)

Linux dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33 < 03c56665dab1f4ac844bc156652d50d639093fa5

Linux dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33

Linux dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33 < 1332c6ed446be787f901ed1064ec6a3c694f028a

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.