CVE-2021-47120: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: HID: magicmouse: fix NULL-deref on disconnect Commit 9d7b18668956 ("HID: magicmouse: add support for Apple Magic Trackpad 2") added a sanity check for an Apple trackpad but returned success instead of -ENODEV when the check failed. This means that the remove callback will dereference the never-initialised driver data pointer when the driver is later unbound (e.g. on USB disconnect).
AI Analysis
Technical Summary
CVE-2021-47120 is a vulnerability identified in the Linux kernel's Human Interface Device (HID) subsystem, specifically related to the Apple Magic Mouse and Magic Trackpad 2 driver. The issue stems from a faulty sanity check introduced in commit 9d7b18668956, which was intended to add support for the Apple Magic Trackpad 2. The check incorrectly returned success instead of the expected error code (-ENODEV) when the device was not recognized. As a result, the remove callback function attempts to dereference a driver data pointer that was never properly initialized. This NULL pointer dereference occurs when the driver is unbound, such as during a USB disconnect event. The consequence is a potential kernel NULL pointer dereference, which can lead to a denial of service (system crash) or possibly other undefined behavior depending on the kernel's state and memory layout. Since this vulnerability is in the kernel's HID driver, it affects all Linux distributions using the vulnerable kernel versions containing the faulty commit. The vulnerability does not require user interaction beyond device connection and disconnection, and no authentication is needed to trigger it. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet. However, the issue has been publicly disclosed and patched in the Linux kernel source, indicating the importance of updating affected systems.
Potential Impact
For European organizations, the impact of CVE-2021-47120 primarily involves potential denial of service conditions on Linux systems that use Apple Magic Mouse or Magic Trackpad 2 devices. This could disrupt operations on workstations, servers, or embedded systems running vulnerable Linux kernels, especially in environments where these input devices are common. Critical infrastructure or enterprise environments relying on Linux for workstation or server operations could experience system instability or crashes triggered by device disconnect events, potentially leading to downtime or loss of productivity. Although the vulnerability does not appear to allow privilege escalation or remote code execution, denial of service in sensitive environments can have cascading effects, including interruption of business processes, delayed response times, and increased operational costs. The lack of known exploits reduces immediate risk, but the public disclosure means attackers could develop exploits, increasing future risk. Organizations in Europe with Linux deployments in sectors such as finance, manufacturing, healthcare, and government should be aware of this vulnerability due to their reliance on stable Linux environments and the potential use of Apple peripherals.
Mitigation Recommendations
To mitigate CVE-2021-47120, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available from their distribution vendors or directly from the Linux kernel source. 2) Audit and inventory Linux systems to identify those using vulnerable kernel versions and Apple Magic Mouse or Magic Trackpad 2 devices. 3) Where patching is delayed, consider temporarily disabling or avoiding the use of affected Apple HID devices on critical systems to prevent triggering the NULL pointer dereference. 4) Implement monitoring for kernel crashes or unusual system reboots that could indicate exploitation attempts. 5) Engage with hardware and software vendors to ensure compatibility and timely updates. 6) For environments with strict uptime requirements, test patches in staging environments before deployment to avoid unintended disruptions. 7) Educate IT staff about the vulnerability and the importance of prompt patching and device management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2021-47120: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: HID: magicmouse: fix NULL-deref on disconnect Commit 9d7b18668956 ("HID: magicmouse: add support for Apple Magic Trackpad 2") added a sanity check for an Apple trackpad but returned success instead of -ENODEV when the check failed. This means that the remove callback will dereference the never-initialised driver data pointer when the driver is later unbound (e.g. on USB disconnect).
AI-Powered Analysis
Technical Analysis
CVE-2021-47120 is a vulnerability identified in the Linux kernel's Human Interface Device (HID) subsystem, specifically related to the Apple Magic Mouse and Magic Trackpad 2 driver. The issue stems from a faulty sanity check introduced in commit 9d7b18668956, which was intended to add support for the Apple Magic Trackpad 2. The check incorrectly returned success instead of the expected error code (-ENODEV) when the device was not recognized. As a result, the remove callback function attempts to dereference a driver data pointer that was never properly initialized. This NULL pointer dereference occurs when the driver is unbound, such as during a USB disconnect event. The consequence is a potential kernel NULL pointer dereference, which can lead to a denial of service (system crash) or possibly other undefined behavior depending on the kernel's state and memory layout. Since this vulnerability is in the kernel's HID driver, it affects all Linux distributions using the vulnerable kernel versions containing the faulty commit. The vulnerability does not require user interaction beyond device connection and disconnection, and no authentication is needed to trigger it. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet. However, the issue has been publicly disclosed and patched in the Linux kernel source, indicating the importance of updating affected systems.
Potential Impact
For European organizations, the impact of CVE-2021-47120 primarily involves potential denial of service conditions on Linux systems that use Apple Magic Mouse or Magic Trackpad 2 devices. This could disrupt operations on workstations, servers, or embedded systems running vulnerable Linux kernels, especially in environments where these input devices are common. Critical infrastructure or enterprise environments relying on Linux for workstation or server operations could experience system instability or crashes triggered by device disconnect events, potentially leading to downtime or loss of productivity. Although the vulnerability does not appear to allow privilege escalation or remote code execution, denial of service in sensitive environments can have cascading effects, including interruption of business processes, delayed response times, and increased operational costs. The lack of known exploits reduces immediate risk, but the public disclosure means attackers could develop exploits, increasing future risk. Organizations in Europe with Linux deployments in sectors such as finance, manufacturing, healthcare, and government should be aware of this vulnerability due to their reliance on stable Linux environments and the potential use of Apple peripherals.
Mitigation Recommendations
To mitigate CVE-2021-47120, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available from their distribution vendors or directly from the Linux kernel source. 2) Audit and inventory Linux systems to identify those using vulnerable kernel versions and Apple Magic Mouse or Magic Trackpad 2 devices. 3) Where patching is delayed, consider temporarily disabling or avoiding the use of affected Apple HID devices on critical systems to prevent triggering the NULL pointer dereference. 4) Implement monitoring for kernel crashes or unusual system reboots that could indicate exploitation attempts. 5) Engage with hardware and software vendors to ensure compatibility and timely updates. 6) For environments with strict uptime requirements, test patches in staging environments before deployment to avoid unintended disruptions. 7) Educate IT staff about the vulnerability and the importance of prompt patching and device management.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-03-04T18:12:48.838Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe9db2
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 10:09:49 PM
Last updated: 8/9/2025, 9:26:27 PM
Views: 15
Related Threats
CVE-2025-55207: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in withastro astro
MediumCVE-2025-49897: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in gopiplus Vertical scroll slideshow gallery v2
HighCVE-2025-49432: CWE-862 Missing Authorization in FWDesign Ultimate Video Player
MediumCVE-2025-55203: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in makeplane plane
MediumCVE-2025-54989: CWE-476: NULL Pointer Dereference in FirebirdSQL firebird
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.