Cyber Posture

CVE-2025-21789

High

Published: 27 February 2025

Published
27 February 2025
Modified
01 October 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0005 16.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-21789 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 16.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation directly addresses this CVE by requiring application of upstream kernel patches that fix the out-of-bounds read and undefined shift in LoongArch IP checksum code.

prevent

Information input validation prevents the processing of negative lengths that trigger the out-of-bounds read and undefined shift in the IP checksum function.

detect

Vulnerability monitoring and scanning identifies deployed LoongArch kernels affected by this specific CVE for prioritization of remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

OOB read enables collection of sensitive data from local kernel memory (T1005); undefined behavior and negative lengths enable crashes for DoS via system exploitation (T1499.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: LoongArch: csum: Fix OoB access in IP checksum code for negative lengths Commit 69e3a6aa6be2 ("LoongArch: Add checksum optimization for 64-bit system") would cause an undefined shift and an out-of-bounds read.…

more

Commit 8bd795fedb84 ("arm64: csum: Fix OoB access in IP checksum code for negative lengths") fixes the same issue on ARM64.

Deeper analysisAI

CVE-2025-21789 is a vulnerability in the Linux kernel's LoongArch architecture implementation of IP checksum calculation. It manifests as an out-of-bounds read and undefined shift operation triggered by negative lengths, stemming from commit 69e3a6aa6be2 ("LoongArch: Add checksum optimization for 64-bit system"). This issue mirrors a previously fixed problem in ARM64 via commit 8bd795fedb84. The flaw is classified under CWE-125 (Out-of-bounds Read) with a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H).

A local attacker with low privileges can exploit this vulnerability with low attack complexity and no user interaction required. Successful exploitation enables high-impact confidentiality violations through out-of-bounds reads, potentially leaking sensitive kernel memory, alongside high availability disruption, such as denial of service via crashes or instability.

Mitigation is provided through upstream kernel patches in the stable repository, including commits 6287f1a8c16138c2ec750953e35039634018c84a, 964a8895704a22efc06a2a3276b624a5ae985a06, 9f15a8df542c0f08732a67d1a14ee7c22948fb97, and d6508ffff32b44b6d0de06704034e4eef1c307a7. Security practitioners should update affected LoongArch-based Linux kernels to incorporate these fixes.

Details

CWE(s)

Affected Products

linux
linux kernel
6.14 · 6.4 — 6.6.79 · 6.7 — 6.12.16 · 6.13 — 6.13.4

CVEs Like This One

CVE-2025-71231Same product: Linux Linux Kernel
CVE-2024-58015Same product: Linux Linux Kernel
CVE-2024-52332Same product: Linux Linux Kernel
CVE-2025-71093Same product: Linux Linux Kernel
CVE-2026-23397Same product: Linux Linux Kernel
CVE-2025-21742Same product: Linux Linux Kernel
CVE-2024-58007Same product: Linux Linux Kernel
CVE-2025-71133Same product: Linux Linux Kernel
CVE-2026-23187Same product: Linux Linux Kernel
CVE-2026-23315Same product: Linux Linux Kernel

References