CVE-2025-54462
BaseFortify
Publication date: 2025-08-25
Last updated on: 2025-11-03
Assigner: Talos
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| libbiosig_project | libbiosig | to 3.9.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a heap-based buffer overflow in the Nex parsing functionality of The Biosig Project libbiosig versions 3.9.0 and the Master Branch (35a819fa). It occurs when a specially crafted .nex file is processed, allowing an attacker to trigger arbitrary code execution by providing a malicious file.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to execute arbitrary code on the affected system without any privileges or user interaction. This can lead to full compromise of the system, including unauthorized access, data corruption, or denial of service.