CVE-2025-37810: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: check that event count does not exceed event buffer length The event count is read from register DWC3_GEVNTCOUNT. There is a check for the count being zero, but not for exceeding the event buffer length. Check that event count does not exceed event buffer length, avoiding an out-of-bounds access when memcpy'ing the event. Crash log: Unable to handle kernel paging request at virtual address ffffffc0129be000 pc : __memcpy+0x114/0x180 lr : dwc3_check_event_buf+0xec/0x348 x3 : 0000000000000030 x2 : 000000000000dfc4 x1 : ffffffc0129be000 x0 : ffffff87aad60080 Call trace: __memcpy+0x114/0x180 dwc3_interrupt+0x24/0x34
AI Analysis
Technical Summary
CVE-2025-37810 is a vulnerability identified in the Linux kernel's USB gadget driver for the DesignWare Core USB3 (dwc3) controller. Specifically, the flaw exists in the event handling code where the event count, read from the DWC3_GEVNTCOUNT register, is checked only for zero but not validated against the length of the event buffer. This lack of boundary checking can lead to an out-of-bounds memory access during a memcpy operation that copies event data. The vulnerability manifests as a kernel crash due to an invalid memory access, as evidenced by the crash log showing a kernel paging request failure at a virtual address during the memcpy call. The root cause is that the event count can exceed the allocated buffer size, causing memcpy to read or write beyond the buffer limits, potentially leading to memory corruption. While no known exploits are currently reported in the wild, the vulnerability could be leveraged by an attacker with the ability to interact with the USB gadget interface on affected Linux systems. The affected versions appear to be specific Linux kernel commits or builds identified by their hashes, indicating this is a recent and specific patch addressing this issue. The vulnerability does not require user interaction but does require access to the USB gadget interface, which is typically used in embedded or specialized Linux environments. No CVSS score has been assigned yet, and no official patches or mitigation links are provided in the data, though the issue has been publicly disclosed as of May 8, 2025.
Potential Impact
For European organizations, the impact of CVE-2025-37810 depends largely on their use of Linux systems with the affected dwc3 USB gadget driver enabled. This vulnerability primarily affects embedded systems, IoT devices, or specialized hardware running Linux kernels with USB gadget functionality enabled. If exploited, it could cause denial of service through kernel crashes, potentially disrupting critical services or embedded device operations. In more severe cases, memory corruption could be leveraged for privilege escalation or arbitrary code execution, though this would require further exploitation complexity. European industries relying on embedded Linux devices in sectors such as telecommunications, manufacturing automation, automotive, and critical infrastructure could face operational disruptions. The vulnerability could also affect Linux-based network equipment or USB device emulation platforms used in enterprise environments. Given the kernel-level nature of the flaw, successful exploitation could compromise system integrity and availability, impacting confidentiality if attackers gain elevated privileges. The absence of known exploits reduces immediate risk, but the public disclosure necessitates prompt attention to prevent future attacks.
Mitigation Recommendations
European organizations should first identify all Linux systems running kernels with the affected dwc3 USB gadget driver enabled, focusing on embedded devices and specialized hardware. Immediate mitigation involves applying the official Linux kernel patches once available, as the vulnerability stems from a code-level boundary check omission. Until patches are deployed, organizations should consider disabling USB gadget functionality on affected devices if feasible, especially if the USB gadget interface is not required for normal operations. Network segmentation and strict access controls should be enforced to limit exposure of vulnerable devices to untrusted users or networks. Monitoring kernel logs for unusual USB gadget activity or kernel crashes can help detect attempted exploitation. For embedded device manufacturers and integrators, updating firmware to include patched kernels is critical. Additionally, organizations should implement robust endpoint security measures and maintain an inventory of devices with kernel versions to streamline patch management. Engaging with Linux vendor support channels for timely updates and guidance is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-37810: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: check that event count does not exceed event buffer length The event count is read from register DWC3_GEVNTCOUNT. There is a check for the count being zero, but not for exceeding the event buffer length. Check that event count does not exceed event buffer length, avoiding an out-of-bounds access when memcpy'ing the event. Crash log: Unable to handle kernel paging request at virtual address ffffffc0129be000 pc : __memcpy+0x114/0x180 lr : dwc3_check_event_buf+0xec/0x348 x3 : 0000000000000030 x2 : 000000000000dfc4 x1 : ffffffc0129be000 x0 : ffffff87aad60080 Call trace: __memcpy+0x114/0x180 dwc3_interrupt+0x24/0x34
AI-Powered Analysis
Technical Analysis
CVE-2025-37810 is a vulnerability identified in the Linux kernel's USB gadget driver for the DesignWare Core USB3 (dwc3) controller. Specifically, the flaw exists in the event handling code where the event count, read from the DWC3_GEVNTCOUNT register, is checked only for zero but not validated against the length of the event buffer. This lack of boundary checking can lead to an out-of-bounds memory access during a memcpy operation that copies event data. The vulnerability manifests as a kernel crash due to an invalid memory access, as evidenced by the crash log showing a kernel paging request failure at a virtual address during the memcpy call. The root cause is that the event count can exceed the allocated buffer size, causing memcpy to read or write beyond the buffer limits, potentially leading to memory corruption. While no known exploits are currently reported in the wild, the vulnerability could be leveraged by an attacker with the ability to interact with the USB gadget interface on affected Linux systems. The affected versions appear to be specific Linux kernel commits or builds identified by their hashes, indicating this is a recent and specific patch addressing this issue. The vulnerability does not require user interaction but does require access to the USB gadget interface, which is typically used in embedded or specialized Linux environments. No CVSS score has been assigned yet, and no official patches or mitigation links are provided in the data, though the issue has been publicly disclosed as of May 8, 2025.
Potential Impact
For European organizations, the impact of CVE-2025-37810 depends largely on their use of Linux systems with the affected dwc3 USB gadget driver enabled. This vulnerability primarily affects embedded systems, IoT devices, or specialized hardware running Linux kernels with USB gadget functionality enabled. If exploited, it could cause denial of service through kernel crashes, potentially disrupting critical services or embedded device operations. In more severe cases, memory corruption could be leveraged for privilege escalation or arbitrary code execution, though this would require further exploitation complexity. European industries relying on embedded Linux devices in sectors such as telecommunications, manufacturing automation, automotive, and critical infrastructure could face operational disruptions. The vulnerability could also affect Linux-based network equipment or USB device emulation platforms used in enterprise environments. Given the kernel-level nature of the flaw, successful exploitation could compromise system integrity and availability, impacting confidentiality if attackers gain elevated privileges. The absence of known exploits reduces immediate risk, but the public disclosure necessitates prompt attention to prevent future attacks.
Mitigation Recommendations
European organizations should first identify all Linux systems running kernels with the affected dwc3 USB gadget driver enabled, focusing on embedded devices and specialized hardware. Immediate mitigation involves applying the official Linux kernel patches once available, as the vulnerability stems from a code-level boundary check omission. Until patches are deployed, organizations should consider disabling USB gadget functionality on affected devices if feasible, especially if the USB gadget interface is not required for normal operations. Network segmentation and strict access controls should be enforced to limit exposure of vulnerable devices to untrusted users or networks. Monitoring kernel logs for unusual USB gadget activity or kernel crashes can help detect attempted exploitation. For embedded device manufacturers and integrators, updating firmware to include patched kernels is critical. Additionally, organizations should implement robust endpoint security measures and maintain an inventory of devices with kernel versions to streamline patch management. Engaging with Linux vendor support channels for timely updates and guidance is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.942Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd87f9
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/3/2025, 11:40:24 PM
Last updated: 7/29/2025, 7:46:50 PM
Views: 14
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.