Skip to main content

CVE-2023-25012: n/a in n/a

Medium
VulnerabilityCVE-2023-25012cvecve-2023-25012
Published: Wed Feb 01 2023 (02/01/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.

AI-Powered Analysis

AILast updated: 07/07/2025, 00:27:20 UTC

Technical Analysis

CVE-2023-25012 is a Use-After-Free (UAF) vulnerability identified in the Linux kernel up to version 6.1.9, specifically within the bigben_remove function located in the drivers/hid/hid-bigbenff.c source file. This vulnerability arises because the LED controllers associated with certain USB Human Interface Devices (HID) remain registered longer than intended after device removal. An attacker can exploit this flaw by connecting a specially crafted malicious USB device that triggers the improper handling of the LED controller resources. The UAF condition occurs when the kernel attempts to access or manipulate memory that has already been freed, leading to undefined behavior. Although the vulnerability does not impact confidentiality or integrity directly, it can cause a denial of service (DoS) by crashing the kernel or destabilizing the system, as indicated by the CVSS vector (AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The attack vector requires physical proximity since the attacker must connect a malicious USB device, but no privileges or user interaction are needed beyond device connection. No known exploits have been reported in the wild, and no official patches were linked in the provided data, though it is expected that kernel maintainers will address this in future updates. The vulnerability is classified under CWE-416 (Use After Free), a common memory corruption issue that can lead to system instability or crashes.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to systems running vulnerable Linux kernel versions that support the affected HID drivers, particularly those that allow USB device connections without strict controls. The impact is mainly a potential denial of service, which could disrupt critical services or operations, especially in environments relying on Linux servers or embedded devices with USB interfaces. While it does not enable privilege escalation or data leakage, the ability to crash or destabilize systems remotely via USB could be exploited in targeted attacks or insider threat scenarios. Organizations with high physical access control or USB device management policies may be less exposed. However, sectors such as manufacturing, telecommunications, or critical infrastructure that use Linux-based control systems and allow USB device connections could face operational interruptions. Additionally, the lack of user interaction requirement means that simply plugging in a malicious device could trigger the vulnerability, increasing risk in shared or public environments.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately restrict or disable USB ports on critical Linux systems where possible, using BIOS/UEFI settings or kernel-level USB device filtering. 2) Deploy endpoint security solutions capable of controlling and whitelisting USB devices to prevent unauthorized or unknown devices from connecting. 3) Monitor kernel updates from the Linux kernel maintainers and promptly apply patches once available, especially for systems running kernel versions up to 6.1.9. 4) For systems that cannot be patched immediately, consider unloading or blacklisting the hid-bigbenff driver module if it is not required, to eliminate the attack surface. 5) Implement physical security controls to limit unauthorized physical access to machines, reducing the risk of malicious USB device insertion. 6) Conduct regular audits of USB device usage and system logs to detect anomalous device connections or kernel crashes that could indicate exploitation attempts. 7) Educate staff about the risks of connecting unknown USB devices and enforce strict policies regarding USB usage in sensitive environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-02-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc4be

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:27:20 AM

Last updated: 8/3/2025, 12:49:56 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats