CVE-2025-21992: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: HID: ignore non-functional sensor in HP 5MP Camera The HP 5MP Camera (USB ID 0408:5473) reports a HID sensor interface that is not actually implemented. Attempting to access this non-functional sensor via iio_info causes system hangs as runtime PM tries to wake up an unresponsive sensor. [453] hid-sensor-hub 0003:0408:5473.0003: Report latency attributes: ffffffff:ffffffff [453] hid-sensor-hub 0003:0408:5473.0003: common attributes: 5:1, 2:1, 3:1 ffffffff:ffffffff Add this device to the HID ignore list since the sensor interface is non-functional by design and should not be exposed to userspace.
AI Analysis
Technical Summary
CVE-2025-21992 addresses a vulnerability in the Linux kernel related to the handling of the HP 5MP Camera (USB ID 0408:5473). This device incorrectly reports a Human Interface Device (HID) sensor interface that is not actually implemented. When the Linux kernel attempts to access this non-functional sensor via the iio_info interface, it triggers system hangs due to the runtime power management (PM) subsystem trying to wake up a sensor that does not respond. The kernel logs indicate attempts to read latency and common attributes from the sensor interface, which return invalid values (ffffffff:ffffffff), confirming the sensor's non-functionality. The root cause is that the device exposes a sensor interface by design that should not be accessible to userspace. The vulnerability is mitigated by adding this device to the HID ignore list, preventing the kernel from exposing the non-functional sensor interface and thus avoiding system hangs. The affected Linux kernel versions are identified by a specific commit hash repeated multiple times, indicating the vulnerability was present in certain kernel builds prior to the patch. No known exploits are reported in the wild, and no CVSS score has been assigned. The issue primarily affects systems using the HP 5MP Camera on Linux kernels that do not include the fix to ignore the non-functional sensor interface.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to system stability and availability. Systems running vulnerable Linux kernels with the affected HP 5MP Camera connected may experience system hangs or freezes when the kernel attempts to interact with the non-functional sensor interface. This can disrupt normal operations, particularly in environments where the camera is used for video conferencing, security monitoring, or other critical functions. While the vulnerability does not directly expose confidentiality or integrity risks, the denial of service caused by system hangs can affect productivity and availability of services. Organizations relying on Linux-based workstations, servers, or embedded devices with this specific camera model may face operational disruptions. However, the scope is limited to systems with the affected hardware and vulnerable kernel versions. Since no remote exploitation or privilege escalation is indicated, the threat is localized to physical or local user scenarios where the device is connected and accessed.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should ensure that their Linux systems are updated to kernel versions that include the patch adding the HP 5MP Camera to the HID ignore list. This prevents the kernel from exposing the non-functional sensor interface and avoids system hangs. Specifically, system administrators should: 1) Identify systems using the HP 5MP Camera (USB ID 0408:5473) by inventory or device management tools. 2) Verify the Linux kernel version and update to the latest stable release or a version that contains the fix for CVE-2025-21992. 3) If immediate kernel updates are not feasible, consider disabling or physically disconnecting the affected camera devices to prevent triggering the vulnerability. 4) Monitor system logs for messages related to hid-sensor-hub and the specific USB ID to detect attempts to access the non-functional sensor. 5) Test updates in controlled environments before wide deployment to ensure compatibility and stability. These steps go beyond generic advice by focusing on hardware identification, kernel version management, and targeted device controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-21992: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: HID: ignore non-functional sensor in HP 5MP Camera The HP 5MP Camera (USB ID 0408:5473) reports a HID sensor interface that is not actually implemented. Attempting to access this non-functional sensor via iio_info causes system hangs as runtime PM tries to wake up an unresponsive sensor. [453] hid-sensor-hub 0003:0408:5473.0003: Report latency attributes: ffffffff:ffffffff [453] hid-sensor-hub 0003:0408:5473.0003: common attributes: 5:1, 2:1, 3:1 ffffffff:ffffffff Add this device to the HID ignore list since the sensor interface is non-functional by design and should not be exposed to userspace.
AI-Powered Analysis
Technical Analysis
CVE-2025-21992 addresses a vulnerability in the Linux kernel related to the handling of the HP 5MP Camera (USB ID 0408:5473). This device incorrectly reports a Human Interface Device (HID) sensor interface that is not actually implemented. When the Linux kernel attempts to access this non-functional sensor via the iio_info interface, it triggers system hangs due to the runtime power management (PM) subsystem trying to wake up a sensor that does not respond. The kernel logs indicate attempts to read latency and common attributes from the sensor interface, which return invalid values (ffffffff:ffffffff), confirming the sensor's non-functionality. The root cause is that the device exposes a sensor interface by design that should not be accessible to userspace. The vulnerability is mitigated by adding this device to the HID ignore list, preventing the kernel from exposing the non-functional sensor interface and thus avoiding system hangs. The affected Linux kernel versions are identified by a specific commit hash repeated multiple times, indicating the vulnerability was present in certain kernel builds prior to the patch. No known exploits are reported in the wild, and no CVSS score has been assigned. The issue primarily affects systems using the HP 5MP Camera on Linux kernels that do not include the fix to ignore the non-functional sensor interface.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to system stability and availability. Systems running vulnerable Linux kernels with the affected HP 5MP Camera connected may experience system hangs or freezes when the kernel attempts to interact with the non-functional sensor interface. This can disrupt normal operations, particularly in environments where the camera is used for video conferencing, security monitoring, or other critical functions. While the vulnerability does not directly expose confidentiality or integrity risks, the denial of service caused by system hangs can affect productivity and availability of services. Organizations relying on Linux-based workstations, servers, or embedded devices with this specific camera model may face operational disruptions. However, the scope is limited to systems with the affected hardware and vulnerable kernel versions. Since no remote exploitation or privilege escalation is indicated, the threat is localized to physical or local user scenarios where the device is connected and accessed.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should ensure that their Linux systems are updated to kernel versions that include the patch adding the HP 5MP Camera to the HID ignore list. This prevents the kernel from exposing the non-functional sensor interface and avoids system hangs. Specifically, system administrators should: 1) Identify systems using the HP 5MP Camera (USB ID 0408:5473) by inventory or device management tools. 2) Verify the Linux kernel version and update to the latest stable release or a version that contains the fix for CVE-2025-21992. 3) If immediate kernel updates are not feasible, consider disabling or physically disconnecting the affected camera devices to prevent triggering the vulnerability. 4) Monitor system logs for messages related to hid-sensor-hub and the specific USB ID to detect attempts to access the non-functional sensor. 5) Test updates in controlled environments before wide deployment to ensure compatibility and stability. These steps go beyond generic advice by focusing on hardware identification, kernel version management, and targeted device controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.800Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8e6a
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 11:41:25 AM
Last updated: 8/16/2025, 12:41:43 PM
Views: 15
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.