Linux Kernel Vulnerability in XFRM SPI Management
CVE-2025-39965

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
13 October 2025

Badges

📈 Score: 108👾 Exploit Exists🟡 Public PoC

What is CVE-2025-39965?

CVE-2025-39965 is a vulnerability identified in the Linux kernel, specifically related to the management of Security Parameter Indexes (SPI) within the XFRM subsystem. The XFRM subsystem is responsible for handling IPsec transformations, which are crucial for securing IP communications through encryption. This vulnerability arises from improper handling of SPI values, where a state with an SPI value of zero is incorrectly created and managed within a list of active SPIs. This mismanagement leads to a use-after-free (UAF) condition, which can be exploited by attackers under specific circumstances. If exploited, this vulnerability could allow unauthorized access or control over systems running affected versions of the Linux kernel, potentially leading to serious security breaches.

Potential impact of CVE-2025-39965

  1. Unauthorized Access: Exploiting this vulnerability can permit attackers to access sensitive data or unauthorized system functions. This could lead to data breaches or compromised credentials, impacting the confidentiality and integrity of organizational information.

  2. Denial of Service: The exploitation of the UAF condition may result in system instability or crashes, leading to potential denial of service (DoS). Such disruptions can affect business operations, resulting in downtime and financial losses.

  3. Further Exploitation Opportunities: Once an attacker gains a foothold through this vulnerability, they may leverage it as a stepping stone to deploy additional harmful activities, such as installing malware, establishing persistent access, or escalating privileges within the system. This could lead to more extensive system compromises and network infiltration.

Affected Version(s)

Linux 3d8090bb53424432fa788fe9a49e8ceca74f0544 < 0baf92d0b1590b903c1f4ead75e61715e50e8146

Linux 2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38 < 9fcedabaae0096f712bbb4ccca6a8538af1cd1c8

Linux 29e9158f91f99057dbd35db5e8674d93b38549fe

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.