Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25741: n/a

0
Medium
VulnerabilityCVE-2024-25741cvecve-2024-25741
Published: Mon Feb 12 2024 (02/12/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

printer_write in drivers/usb/gadget/function/f_printer.c in the Linux kernel through 6.7.4 does not properly call usb_ep_queue, which might allow attackers to cause a denial of service or have unspecified other impact.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:56:07 UTC

Technical Analysis

CVE-2024-25741 identifies a vulnerability in the Linux kernel's USB gadget printer driver, specifically in the printer_write function located in drivers/usb/gadget/function/f_printer.c. The issue stems from improper handling of the usb_ep_queue call, which is responsible for queuing USB endpoint requests. Failure to correctly call usb_ep_queue can cause the USB gadget printer function to malfunction, potentially leading to denial of service by causing the device or kernel subsystem to hang or crash. The vulnerability affects Linux kernel versions through 6.7.4. The Common Weakness Enumeration (CWE) classification is CWE-703, indicating an improper resource shutdown or release. The CVSS v3.1 base score is 5.5 (medium severity), with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, meaning the attack requires local access with low complexity and privileges, no user interaction, and impacts availability only. No known exploits have been reported in the wild, and no patches are currently linked, suggesting this is a recently disclosed issue. The vulnerability could be exploited by an attacker with local access to the system to cause a denial of service, potentially disrupting operations relying on USB gadget printer functionality. The unspecified other impacts are not detailed but may include other forms of resource mismanagement or instability. This vulnerability is particularly relevant for embedded systems, IoT devices, or specialized Linux deployments that utilize the USB gadget printer driver for USB device emulation.

Potential Impact

For European organizations, the primary impact is on system availability where the Linux kernel USB gadget printer function is in use. This could affect embedded devices, industrial control systems, or specialized hardware that emulate USB printers via the Linux USB gadget framework. A denial of service could disrupt printing services or cause device instability, impacting operational continuity. Since the vulnerability requires local access and low privileges, insider threats or compromised local accounts pose a risk. The lack of impact on confidentiality or integrity limits data breach concerns, but availability disruptions could affect manufacturing, logistics, or administrative processes relying on these devices. Organizations with extensive Linux deployments, especially in sectors like manufacturing, telecommunications, and research institutions, may face operational risks. The absence of known exploits reduces immediate threat but patching or mitigation is advised to prevent future exploitation.

Mitigation Recommendations

1. Monitor for official Linux kernel updates addressing CVE-2024-25741 and apply patches promptly once available. 2. If patching is not immediately possible, disable the USB gadget printer function in the kernel configuration or blacklist the f_printer module to prevent usage of the vulnerable code path. 3. Restrict local access to systems running affected kernel versions to trusted users only, minimizing the risk of local exploitation. 4. Employ strict access controls and monitoring on devices that use USB gadget functionality, particularly in embedded or industrial environments. 5. Conduct audits of Linux kernel versions in use across the organization to identify systems running versions up to 6.7.4 and assess exposure. 6. Implement system integrity monitoring to detect unusual crashes or USB subsystem errors that may indicate exploitation attempts. 7. Educate system administrators about the vulnerability and the importance of limiting local privilege escalation and access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-02-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909261ffe7723195e0b46bf

Added to database: 11/3/2025, 10:01:03 PM

Last enriched: 11/3/2025, 11:56:07 PM

Last updated: 11/5/2025, 2:11:37 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats