Skip to main content

CVE-2025-21992: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-21992cvecve-2025-21992
Published: Wed Apr 02 2025 (04/02/2025, 12:53:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: HID: ignore non-functional sensor in HP 5MP Camera The HP 5MP Camera (USB ID 0408:5473) reports a HID sensor interface that is not actually implemented. Attempting to access this non-functional sensor via iio_info causes system hangs as runtime PM tries to wake up an unresponsive sensor. [453] hid-sensor-hub 0003:0408:5473.0003: Report latency attributes: ffffffff:ffffffff [453] hid-sensor-hub 0003:0408:5473.0003: common attributes: 5:1, 2:1, 3:1 ffffffff:ffffffff Add this device to the HID ignore list since the sensor interface is non-functional by design and should not be exposed to userspace.

AI-Powered Analysis

AILast updated: 06/30/2025, 11:41:25 UTC

Technical Analysis

CVE-2025-21992 addresses a vulnerability in the Linux kernel related to the handling of the HP 5MP Camera (USB ID 0408:5473). This device incorrectly reports a Human Interface Device (HID) sensor interface that is not actually implemented. When the Linux kernel attempts to access this non-functional sensor via the iio_info interface, it triggers system hangs due to the runtime power management (PM) subsystem trying to wake up a sensor that does not respond. The kernel logs indicate attempts to read latency and common attributes from the sensor interface, which return invalid values (ffffffff:ffffffff), confirming the sensor's non-functionality. The root cause is that the device exposes a sensor interface by design that should not be accessible to userspace. The vulnerability is mitigated by adding this device to the HID ignore list, preventing the kernel from exposing the non-functional sensor interface and thus avoiding system hangs. The affected Linux kernel versions are identified by a specific commit hash repeated multiple times, indicating the vulnerability was present in certain kernel builds prior to the patch. No known exploits are reported in the wild, and no CVSS score has been assigned. The issue primarily affects systems using the HP 5MP Camera on Linux kernels that do not include the fix to ignore the non-functional sensor interface.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to system stability and availability. Systems running vulnerable Linux kernels with the affected HP 5MP Camera connected may experience system hangs or freezes when the kernel attempts to interact with the non-functional sensor interface. This can disrupt normal operations, particularly in environments where the camera is used for video conferencing, security monitoring, or other critical functions. While the vulnerability does not directly expose confidentiality or integrity risks, the denial of service caused by system hangs can affect productivity and availability of services. Organizations relying on Linux-based workstations, servers, or embedded devices with this specific camera model may face operational disruptions. However, the scope is limited to systems with the affected hardware and vulnerable kernel versions. Since no remote exploitation or privilege escalation is indicated, the threat is localized to physical or local user scenarios where the device is connected and accessed.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should ensure that their Linux systems are updated to kernel versions that include the patch adding the HP 5MP Camera to the HID ignore list. This prevents the kernel from exposing the non-functional sensor interface and avoids system hangs. Specifically, system administrators should: 1) Identify systems using the HP 5MP Camera (USB ID 0408:5473) by inventory or device management tools. 2) Verify the Linux kernel version and update to the latest stable release or a version that contains the fix for CVE-2025-21992. 3) If immediate kernel updates are not feasible, consider disabling or physically disconnecting the affected camera devices to prevent triggering the vulnerability. 4) Monitor system logs for messages related to hid-sensor-hub and the specific USB ID to detect attempts to access the non-functional sensor. 5) Test updates in controlled environments before wide deployment to ensure compatibility and stability. These steps go beyond generic advice by focusing on hardware identification, kernel version management, and targeted device controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.800Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe8e6a

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 11:41:25 AM

Last updated: 8/16/2025, 12:41:43 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats