CVE-2025-38736
📋 TL;DR
A Linux kernel vulnerability in the ASIX USB network driver allows invalid PHY addresses to be used during MDIO bus initialization, potentially causing shift-out-of-bounds exceptions. This affects systems using ASIX USB network adapters with the vulnerable kernel driver. The issue could lead to system instability or denial of service.
💻 Affected Systems
- Linux kernel ASIX USB network driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic or system crash leading to denial of service, potentially requiring physical access to restart affected systems.
Likely Case
System instability, network connectivity issues, or kernel crashes when using ASIX USB network adapters with invalid PHY addresses.
If Mitigated
Minor performance impact or no effect if proper PHY addresses are used and the mask is applied.
🎯 Exploit Status
Exploitation requires physical access to connect a malicious USB device or control over USB device configuration. Syzbot discovered this through fuzzing.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 22042ffedd8c2c6db08ccdd6d4273068eddd3c5c, 24ef2f53c07f273bad99173e27ee88d44d135b1c, 523eab02fce458fa6d3c51de5bb055800986953e, 748da80831221ae24b4bc8d7ffb22acd5712a341, 8f141f2a4f2ef8ca865d5921574c3d6535e00a49
Vendor Advisory: https://git.kernel.org/stable/c/22042ffedd8c2c6db08ccdd6d4273068eddd3c5c
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable ASIX USB driver
linuxPrevent loading of the vulnerable ASIX USB network driver
echo 'blacklist asix' >> /etc/modprobe.d/blacklist.conf
rmmod asix
Restrict USB device access
linuxPrevent unauthorized USB devices from being connected
echo '0' > /sys/bus/usb/drivers/asix/new_id
chmod 000 /sys/bus/usb/drivers/asix/bind
🧯 If You Can't Patch
- Physically disconnect ASIX USB network adapters from critical systems
- Implement USB device control policies to prevent unauthorized ASIX device connections
🔍 How to Verify
Check if Vulnerable:
Check if ASIX driver is loaded: lsmod | grep asix. Check kernel version: uname -r and compare with patched versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits. Check dmesg for ASIX driver initialization errors.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- MDIO bus initialization errors in dmesg
- ASIX driver crash logs
Network Indicators:
- Sudden loss of network connectivity on USB interfaces
- USB device disconnection events
SIEM Query:
source="kernel" AND ("asix" OR "MDIO" OR "shift-out-of-bounds")
🔗 References
- https://git.kernel.org/stable/c/22042ffedd8c2c6db08ccdd6d4273068eddd3c5c
- https://git.kernel.org/stable/c/24ef2f53c07f273bad99173e27ee88d44d135b1c
- https://git.kernel.org/stable/c/523eab02fce458fa6d3c51de5bb055800986953e
- https://git.kernel.org/stable/c/748da80831221ae24b4bc8d7ffb22acd5712a341
- https://git.kernel.org/stable/c/8f141f2a4f2ef8ca865d5921574c3d6535e00a49
- https://git.kernel.org/stable/c/fcb4ce9f729c1d08e53abf9d449340e24c3edee6
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html