Cyber Posture

CVE-2025-71112

High

Published: 14 January 2026

Published
14 January 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0002 4.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-71112 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local kernel OOB read in hns3 driver enables privilege escalation via crafted VF mailbox message in SR-IOV setups.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validation before using Currently, the VLAN id may be used without validation when receive a VLAN configuration mailbox from VF. The length of vlan_del_fail_bmap is…

more

BITS_TO_LONGS(VLAN_N_VID). It may cause out-of-bounds memory access once the VLAN id is bigger than or equal to VLAN_N_VID. Therefore, VLAN id needs to be checked to ensure it is within the range of VLAN_N_VID.

Deeper analysisAI

CVE-2025-71112 is a vulnerability in the Linux kernel's hns3 network driver, where VLAN IDs received via a VLAN configuration mailbox from a virtual function (VF) are not validated before use. This can lead to out-of-bounds memory access in the vlan_del_fail_bmap array, which is sized based on BITS_TO_LONGS(VLAN_N_VID). If the VLAN ID is greater than or equal to VLAN_N_VID, it triggers the issue, classified under CWE-125 (Out-of-bounds Read) with a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H).

A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. In SR-IOV environments where VFs communicate with the physical function (PF) via mailboxes, a malicious VF can send a crafted VLAN configuration message containing an oversized VLAN ID. Successful exploitation enables high-impact confidentiality violations through out-of-bounds reads and high-impact availability disruptions, such as kernel crashes, while integrity impact remains none.

Mitigation involves applying kernel patches that add VLAN ID validation to ensure values stay within the VLAN_N_VID range before processing. Relevant stable kernel commits include 00e56a7706e10b3d00a258d81fcb85a7e96372d6, 42c91dfa772c57de141e5a55a187ac760c0fd7e1, 46c7d9fe8dd869ea5de666aba8c1ec1061ca44a8, 6ef935e65902bfed53980ad2754b06a284ea8ac1, and 91a51d01be5c9f82c12c2921ca5cceaa31b67128, available via git.kernel.org.

Details

CWE(s)

Affected Products

linux
linux kernel
5.3, 6.19 · 5.3.1 — 5.10.248 · 5.11 — 5.15.198 · 5.16 — 6.1.160

CVEs Like This One

CVE-2026-23099Same product: Linux Linux Kernel
CVE-2026-23407Same product: Linux Linux Kernel
CVE-2026-43025Same product: Linux Linux Kernel
CVE-2026-31675Same product: Linux Linux Kernel
CVE-2026-43048Same product: Linux Linux Kernel
CVE-2026-31641Same product: Linux Linux Kernel
CVE-2026-31570Same product: Linux Linux Kernel
CVE-2026-23406Same product: Linux Linux Kernel
CVE-2024-57998Same product: Linux Linux Kernel
CVE-2026-31558Same product: Linux Linux Kernel

References