CVE-2025-39760
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: core: config: Prevent OOB read in SS endpoint companion parsing
usb_parse_ss_endpoint_companion() checks descriptor type before length, enabling a potentially odd read outside of the buffer size.
Fix this up by checking the size first before looking at any of the fields in the descriptor.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, a missing length check before type check in USB SuperSpeed endpoint companion parsing can lead to an out-of-bounds read.
Vulnerability
Overview
The vulnerability resides in the Linux kernel's USB subsystem, specifically in the function usb_parse_ss_endpoint_companion(). The code checks the descriptor type before verifying the descriptor length, which allows a malformed USB descriptor to cause an out-of-bounds read beyond the allocated buffer. This flaw was introduced during the parsing of SuperSpeed endpoint companion descriptors and is fixed by reordering the checks to validate length first [2][3][4].
Exploitation
Conditions
An attacker with physical access to the system or the ability to connect a malicious USB device can exploit this vulnerability. No authentication is required; the attack is triggered during USB device enumeration when the kernel parses the device's descriptors. The attacker must supply a crafted USB descriptor that passes the type check but has an insufficient length, causing the kernel to read beyond the buffer.
Impact
Successful exploitation can lead to information disclosure (reading kernel memory) or a system crash (denial of service). The CVSS v3 score of 7.1 (High) reflects the potential for significant impact on confidentiality and availability. The vulnerability does not directly enable privilege escalation, but leaked memory may aid further attacks.
Mitigation
Patches have been applied to the Linux kernel stable tree and are available in commits referenced [2][3][4]. Affected products include Siemens SIMATIC CN 4100 (all versions before V5.0) as listed in the Siemens advisory [1]. Users should update to the latest kernel version or apply the specific fix. No workaround is documented; the only mitigation is to apply the patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Linux/Linuxv5Range: 2.6.35
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- git.kernel.org/stable/c/058ad2b722812708fe90567875704ae36563e33bnvdPatch
- git.kernel.org/stable/c/4fe6f472f0beef4281e6f03bc38a910a33be663fnvdPatch
- git.kernel.org/stable/c/5badd56c711e2c8371d1670f9bd486697575423cnvdPatch
- git.kernel.org/stable/c/5c3097ede7835d3caf6543eb70ff689af4550cd2nvdPatch
- git.kernel.org/stable/c/9512510cee7d1becdb0e9413fdd3ab783e4e30eenvdPatch
- git.kernel.org/stable/c/9843bcb187cb933861f7805022e6873905f669e4nvdPatch
- git.kernel.org/stable/c/b10e0f868067c6f25bbfabdcf3e1e6432c24ca55nvdPatch
- git.kernel.org/stable/c/cf16f408364efd8a68f39011a3b073c83a03612dnvdPatch
- lists.debian.org/debian-lts-announce/2025/10/msg00007.htmlnvdThird Party Advisory
- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-032379.htmlnvd
News mentions
1- Siemens SIMATICCISA ICS Advisories