CVE-2026-43136
Awaiting Analysis Awaiting Analysis - Queue
HID Report Descriptor Parsing Flaw in Linux Kernel

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: HID: logitech-hidpp: Check maxfield in hidpp_get_report_length() Do not crash when a report has no fields. Fake USB gadgets can send their own HID report descriptors and can define report structures without valid fields. This can be used to crash the kernel over USB.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux kernel *
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's HID (Human Interface Device) driver for Logitech devices, specifically in the function hidpp_get_report_length().

The issue arises because the kernel does not properly check the maximum field value (maxfield) when processing HID report descriptors. Fake USB gadgets can send crafted HID report descriptors that define report structures without valid fields.

As a result, the kernel may crash when it encounters a report with no fields, leading to a denial of service.


How can this vulnerability impact me? :

An attacker can exploit this vulnerability by connecting a malicious USB device that sends specially crafted HID report descriptors to the Linux system.

This can cause the kernel to crash, resulting in a denial of service condition where the system becomes unstable or unresponsive.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart