VYPR
High severity7.0NVD Advisory· Published Sep 5, 2025· Updated May 12, 2026

CVE-2025-39702

CVE-2025-39702

Description

In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: Fix MAC comparison to be constant-time

To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A timing side-channel in the Linux kernel's IPv6 Segment Routing MAC comparison allows attackers to forge authentication bits via variable-time memcmp().

Vulnerability

Description

CVE-2025-39702 addresses a timing side-channel vulnerability in the Linux kernel's IPv6 Segment Routing (SR) implementation. The flaw resided in the function responsible for comparing Message Authentication Codes (MACs) within the SR header. The original code used a standard, non-constant-time comparison (likely memcmp()), which leaks information about the MAC value through variations in execution time [1]. This type of leak is a classic cryptographic timing side-channel [1].

Exploitation

An attacker with the ability to send crafted IPv6 packets to a vulnerable system and observe the timing of the response could exploit this weakness. By sending packets with progressively guessed MAC values and measuring the time taken for the comparison, the attacker can determine the correct MAC byte-by-byte [1]. The attack is likely remote, requires no authentication, and can be performed over a network path that allows accurate timing measurements. No reference describes a practical exploit; however, the theoretical attack surface is clear from the description.

Impact

Successful exploitation would allow an attacker to forge valid HMAC-authenticated Segment Routing Header (SRH) MACs. An attacker who can authenticate a forged SRH can bypass security policies that rely on MAC verification—such as those defined in RFC 8754—and redirect traffic through arbitrary segment paths. The CVSSv3 base score is 7.0 (High), reflecting the potential for confidentiality and integrity impacts via traffic interception or manipulation.

Mitigation

The fix was included in the mainline Linux kernel and backported to stable releases [2][3][4]. Affected distributions should apply the corresponding security updates. Users are advised to update their kernels to a version containing the commit that replaces the non-constant-time MAC comparison with a constant-time helper function [1]. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog as of this writing.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

6
  • cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
  • Linux/Kernel3 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=4.10,<5.15.190
    • cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
  • Linux/Linuxv5
    Range: 4.10

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

1