CVE-2025-64736
Out-of-Bounds Read in libbiosig ABF Parsing Causes Information Leak
Publication date: 2026-03-03
Last updated on: 2026-03-05
Assigner: Talos
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| libbiosig_project | libbiosig | 3.9.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2025-64736 is an out-of-bounds read vulnerability in the ABF (Axon Binary File) parsing functionality of The Biosig Project's libbiosig library versions 3.9.2 and the Master Branch. It occurs because the code does not properly validate an index value, called 'nss', which is read from a specially crafted ABF file."}, {'type': 'paragraph', 'content': "During parsing, the software reads channel names from an array using this 'nss' index. Since 'nss' is attacker-controlled and can be negative or larger than the array size, the program reads memory beyond the allocated buffer. This out-of-bounds read can leak sensitive information or cause the application to crash."}] [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to cause an out-of-bounds read when processing a maliciously crafted ABF file. The consequences include:
- Information disclosure due to reading memory beyond intended bounds, potentially leaking sensitive data.
- Application crashes or denial of service caused by segmentation faults triggered by invalid memory access.
The attack requires local access to the system or application that processes ABF files and user interaction to open the malicious file.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability is triggered by processing specially crafted ABF files with the libbiosig library. Detection involves identifying attempts to open or process suspicious or malformed ABF files locally on the system.'}, {'type': 'paragraph', 'content': 'Since the vulnerability arises from out-of-bounds reads during ABF file parsing, monitoring for application crashes or segmentation faults in programs using libbiosig when opening ABF files can be an indicator.'}, {'type': 'paragraph', 'content': 'There are no specific network commands to detect this vulnerability because the attack vector is local and requires user interaction with malicious files.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect potential exploitation attempts or presence of malicious ABF files include:'}, {'type': 'list_item', 'content': "Use file scanning commands to find ABF files: `find /path/to/data -type f -name '*.abf'`"}, {'type': 'list_item', 'content': "Check application logs or system logs for crashes related to libbiosig or applications processing ABF files: `grep -i 'segfault' /var/log/syslog` or `journalctl -xe`"}, {'type': 'list_item', 'content': 'Run the vulnerable application under a debugger or with memory error detection tools (e.g., Valgrind) to detect out-of-bounds reads when opening ABF files.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid processing untrusted or malicious ABF files with vulnerable versions of libbiosig (3.9.2 and the Master Branch commit 5462afb0).
If possible, update libbiosig to a version where this vulnerability is fixed once available.
Restrict access to systems and applications that process ABF files to trusted users only, minimizing the risk of malicious file introduction.
Implement file validation or scanning to detect malformed ABF files before processing.
Monitor applications for crashes or unusual behavior when handling ABF files and respond accordingly.