Cyber Posture

CVE-2025-21763

High

Published: 27 February 2025

Published
27 February 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 3.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-21763 is a high-severity Use After Free (CWE-416) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the UAF vulnerability by identifying, reporting, and applying the Linux kernel patches that implement RCU protection in __neigh_notify().

detect

Detects systems affected by CVE-2025-21763 through vulnerability scanning to identify vulnerable Linux kernel versions in the neighbour subsystem.

prevent

Implements memory protection mechanisms that mitigate exploitation of the kernel UAF by randomizing memory layouts or enforcing non-executable regions.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The CVE describes a local use-after-free vulnerability in the Linux kernel allowing low-privileged attackers to achieve arbitrary kernel code execution, directly enabling privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: neighbour: use RCU protection in __neigh_notify() __neigh_notify() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF.

Deeper analysisAI

CVE-2025-21763 is a use-after-free (UAF) vulnerability, classified under CWE-416, in the Linux kernel's neighbour subsystem. The issue arises because the __neigh_notify() function can be called without proper RTNL or RCU protection, potentially leading to a UAF condition. It affects Linux kernel versions prior to the application of the relevant stable patches and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local attacker with low privileges can exploit this vulnerability due to its low attack complexity and lack of required user interaction. Successful exploitation could result in high-impact confidentiality, integrity, and availability violations, such as arbitrary code execution, data corruption, or system crashes within the kernel context.

The vulnerability has been addressed through kernel patches available in the Linux stable repository. Key commits include 1cbb2aa90cd3fba15ad7efb5cdda28f3d1082379, 40d8f2f2a373b6c294ffac394d2bb814b572ead1, 559307d25235e24b5424778c7332451b6c741159, 784eb2376270e086f7db136d154b8404edacf97b, and 8666e9aab801328c1408a19fbf4070609dc0695a, which implement RCU protection in __neigh_notify() to prevent the UAF. Security practitioners should update to kernels incorporating these fixes.

Details

CWE(s)

Affected Products

linux
linux kernel
6.14 · 2.6.25 — 5.4.291 · 5.5 — 5.10.235 · 5.11 — 5.15.179

CVEs Like This One

CVE-2026-23221Same product: Linux Linux Kernel
CVE-2025-21631Same product: Linux Linux Kernel
CVE-2025-21855Same product: Linux Linux Kernel
CVE-2026-23158Same product: Linux Linux Kernel
CVE-2026-22995Same product: Linux Linux Kernel
CVE-2026-31695Same product: Linux Linux Kernel
CVE-2026-31650Same product: Linux Linux Kernel
CVE-2025-21714Same product: Linux Linux Kernel
CVE-2024-57892Same product: Linux Linux Kernel
CVE-2025-21722Same product: Linux Linux Kernel

References