CVE-2025-21735
📋 TL;DR
A memory corruption vulnerability in the Linux kernel's NFC subsystem allows attackers to cause out-of-bounds writes by sending specially crafted NFC packets. This affects systems with NFC hardware enabled and the nci_hci_create_pipe() function exposed. Attackers with local or network access to NFC interfaces can potentially exploit this.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel memory corruption leading to privilege escalation, denial of service, or arbitrary code execution with kernel privileges.
Likely Case
Kernel panic or system crash causing denial of service, potentially leading to system instability.
If Mitigated
No impact if NFC hardware is disabled or proper access controls restrict NFC interface access.
🎯 Exploit Status
Requires access to NFC interface and ability to send crafted packets. Exploitation depends on specific memory layout and kernel configuration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel trees (commits referenced in CVE)
Vendor Advisory: https://git.kernel.org/stable/c/10b3f947b609713e04022101f492d288a014ddfa
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable NFC hardware
linuxDisable NFC hardware modules in kernel or physically disable NFC hardware
modprobe -r nci
echo 'blacklist nci' >> /etc/modprobe.d/blacklist.conf
Restrict NFC interface access
linuxUse kernel capabilities or access controls to restrict who can access NFC devices
chmod 600 /dev/nfc*
setcap -r /dev/nfc*
🧯 If You Can't Patch
- Disable all NFC hardware and kernel modules
- Implement strict network segmentation to isolate systems with NFC hardware
🔍 How to Verify
Check if Vulnerable:
Check if NFC modules are loaded: lsmod | grep -i nci; Check kernel version against patched versions
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update matches patched version; Confirm NFC modules still function properly if needed
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- OOM killer activity
- NFC subsystem error messages in dmesg
Network Indicators:
- Unusual NFC packet patterns
- Multiple connection attempts to NFC interfaces
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "nci")
🔗 References
- https://git.kernel.org/stable/c/10b3f947b609713e04022101f492d288a014ddfa
- https://git.kernel.org/stable/c/110b43ef05342d5a11284cc8b21582b698b4ef1c
- https://git.kernel.org/stable/c/172cdfc3a5ea20289c58fb73dadc6fd4a8784a4e
- https://git.kernel.org/stable/c/2ae4bade5a64d126bd18eb66bd419005c5550218
- https://git.kernel.org/stable/c/59c7ed20217c0939862fbf8145bc49d5b3a13f4f
- https://git.kernel.org/stable/c/674e17c5933779a8bf5c15d596fdfcb5ccdebbc2
- https://git.kernel.org/stable/c/bd249109d266f1d52548c46634a15b71656e0d44
- https://git.kernel.org/stable/c/d5a461c315e5ff92657f84d8ba50caa5abf5c22a
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html