Cyber Posture

CVE-2025-21734

High

Published: 27 February 2025

Published
27 February 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-21734 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 2.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of the Linux kernel fastrpc driver flaw via patching to directly prevent out-of-bounds write exploitation.

prevent

Implements memory protection mechanisms that mitigate unauthorized memory access and corruption from improper page size calculations in buffer handling.

detect

Provides vulnerability scanning to identify systems affected by CVE-2025-21734 in the fastrpc driver for prompt remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local kernel memory corruption (out-of-bounds write) in fastrpc driver directly enables privilege escalation by a low-privileged local attacker.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Fix copy buffer page size For non-registered buffer, fastrpc driver copies the buffer and pass it to the remote subsystem. There is a problem with current implementation of…

more

page size calculation which is not considering the offset in the calculation. This might lead to passing of improper and out-of-bounds page size which could result in memory issue. Calculate page start and page end using the offset adjusted address instead of absolute address.

Deeper analysisAI

CVE-2025-21734 is a vulnerability in the Linux kernel's fastrpc driver, specifically affecting the handling of non-registered buffers. When copying buffers to pass to a remote subsystem, the driver incorrectly calculates page size by failing to account for the buffer offset. This results in an improper, out-of-bounds page size being passed, potentially leading to memory corruption issues, classified under CWE-787 (Out-of-bounds Write). The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows high-impact consequences, including unauthorized access to sensitive data (confidentiality), modification of data or code (integrity), and denial of service or system disruption (availability), likely through kernel memory corruption.

Mitigation involves applying the relevant stable kernel patches, as detailed in the upstream commit references. These fixes adjust page start and end calculations to use offset-adjusted addresses instead of absolute addresses, resolving the out-of-bounds issue in the fastrpc driver's buffer copying logic. Security practitioners should update affected Linux kernels promptly, particularly those using the fastrpc subsystem.

Details

CWE(s)

Affected Products

linux
linux kernel
5.2 — 6.1.129 · 6.2 — 6.6.78 · 6.7 — 6.12.14

CVEs Like This One

CVE-2026-31743Same product: Linux Linux Kernel
CVE-2025-21735Same product: Linux Linux Kernel
CVE-2025-71137Same product: Linux Linux Kernel
CVE-2026-23073Same product: Linux Linux Kernel
CVE-2025-21724Same product: Linux Linux Kernel
CVE-2025-71155Same product: Linux Linux Kernel
CVE-2024-54456Same product: Linux Linux Kernel
CVE-2026-23343Same product: Linux Linux Kernel
CVE-2023-52980Same product: Linux Linux Kernel
CVE-2026-23378Same product: Linux Linux Kernel

References