CVE-2025-68206
BaseFortify
Publication date: 2025-12-16
Last updated on: 2026-04-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's netfilter subsystem, specifically the nft_ct component handling FTP traffic with PASV/EPSV modes. The issue arises because sequence adjustment (seqadj) is required when rewriting packet payloads (IP and port) on the FTP control connection due to NAT (Network Address Translation). Without the proper seqadj extension, the FTP NAT changes do not work as expected, causing FTP connections in passive mode to fail, as the kernel misses the necessary sequence adjustment setup call.
How can this vulnerability impact me? :
This vulnerability can cause FTP connections using passive mode (PASV/EPSV) to fail when NAT is involved. Specifically, FTP sessions may be closed unexpectedly with errors like '421 Service not available,' disrupting FTP services and potentially impacting applications or users relying on FTP over NAT environments.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for warnings related to missing sequence adjustment setup calls, specifically messages like 'Missing nfct_seqadj_ext_add() setup call' and warnings from net/netfilter/nf_conntrack_seqadj.c. Additionally, testing FTP connections using PASV mode and checking for connection failures or unexpected behavior (e.g., '421 Service not available, remote server has closed connection') can indicate the presence of the issue. Monitoring the kernel log with commands such as 'dmesg | grep nfct_seqadj_ext_add' or 'journalctl -k | grep nfct_seqadj_ext_add' can help detect this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the conntrack helper is assigned after the DNAT setup in your nftables ruleset, as the issue arises when the helper is assigned before DNAT. Adjust your nftables configuration so that the ftp helper assignment occurs after the DNAT rules. This can be done by ordering the rules appropriately in the nftables tables and chains. Additionally, applying the kernel patch that adds the required sequence adjustment extension when a conntrack helper is assigned to a connection with a NAT binding will resolve the issue.