VYPR
Medium severity5.5NVD Advisory· Published Sep 16, 2025· Updated May 12, 2026

CVE-2025-39808

CVE-2025-39808

Description

In the Linux kernel, the following vulnerability has been resolved:

HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version()

in ntrig_report_version(), hdev parameter passed from hid_probe(). sending descriptor to /dev/uhid can make hdev->dev.parent->parent to null if hdev->dev.parent->parent is null, usb_dev has invalid address(0xffffffffffffff58) that hid_to_usb_dev(hdev) returned when usb_rcvctrlpipe() use usb_dev,it trigger page fault error for address(0xffffffffffffff58)

add null check logic to ntrig_report_version() before calling hid_to_usb_dev()

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Null pointer dereference in Linux kernel's ntrig HID driver allows local denial of service via crafted uhid descriptor.

The vulnerability is a null pointer dereference in the ntrig_report_version() function of the Linux kernel's hid-ntrig driver. When the driver initializes, it attempts to obtain a USB device pointer via hid_to_usb_dev(hdev). If hdev->dev.parent->parent is NULL, the returned pointer becomes invalid (e.g., 0xffffffffffffff58), leading to a page fault when used in usb_rcvctrlpipe(). [CVE description]

An attacker can trigger this by sending a crafted descriptor to the /dev/uhid device, which causes the vulnerable code path to execute. Exploitation requires local access and the ability to interact with the uhid interface, typically requiring root privileges or membership in the appropriate group.

A successful exploit results in a kernel panic (page fault), causing a denial of service (system crash). The vulnerability has a CVSS v3 base score of 5.5 (Medium) due to the need for local access and the medium impact on availability.

The fix adds a null check before calling hid_to_usb_dev() in ntrig_report_version(). Users should apply kernel patches. The Siemens advisory [1] lists this CVE among others affecting their SIMATIC CN 4100 product, urging firmware updates.

References
  1. SSA-032379

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

1