VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40204

CVE-2025-40204

Description

In the Linux kernel, the following vulnerability has been resolved:

sctp: Fix MAC comparison to be constant-time

To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A constant-time MAC comparison was missing in the Linux kernel's SCTP implementation, potentially enabling timing attacks against authentication.

Vulnerability

Overview

CVE-2025-40204 is a security fix in the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation. The vulnerability stems from the usage of a non-constant-time comparison when verifying Message Authentication Codes (MACs). By not using a constant-time comparison, an attacker could exploit timing differences to leak MAC values or forge messages.

Attack

Vector and Exploitation

To exploit this, an attacker would need the ability to observe the system's timing behavior during MAC verification, typically through a local or adjacent network position. The attack does not require authentication but relies on precise timing measurements. The SCTP protocol uses MACs for message integrity and authentication, and a non-constant-time comparison can leak information about the MAC through timing side channels.

Potential

Impact

An attacker could exploit the timing side channel to learn the secret MAC used in SCTP communications, potentially leading to message forgery or denial of service. Since MACs are used for protecting SCTP associations, this could compromise the integrity and authenticity of SCTP packets.

Mitigation

The fix introduces a constant-time MAC comparison function in the Linux kernel. The patch has been merged into stable kernel branches [1][2][3]. Users should apply the latest kernel updates to mitigate this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.