CVE-2025-64736
Received Received - Intake
Out-of-Bounds Read in libbiosig ABF Parsing Causes Information Leak

Publication date: 2026-03-03

Last updated on: 2026-03-05

Assigner: Talos

Description
An out-of-bounds read vulnerability exists in the ABF parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (5462afb0). A specially crafted .abf file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-03
Last Modified
2026-03-05
Generated
2026-05-07
AI Q&A
2026-03-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
libbiosig_project libbiosig 3.9.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2025-64736 is an out-of-bounds read vulnerability in the ABF (Axon Binary File) parsing functionality of The Biosig Project's libbiosig library versions 3.9.2 and the Master Branch. It occurs because the code does not properly validate an index value, called 'nss', which is read from a specially crafted ABF file."}, {'type': 'paragraph', 'content': "During parsing, the software reads channel names from an array using this 'nss' index. Since 'nss' is attacker-controlled and can be negative or larger than the array size, the program reads memory beyond the allocated buffer. This out-of-bounds read can leak sensitive information or cause the application to crash."}] [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to cause an out-of-bounds read when processing a maliciously crafted ABF file. The consequences include:

  • Information disclosure due to reading memory beyond intended bounds, potentially leaking sensitive data.
  • Application crashes or denial of service caused by segmentation faults triggered by invalid memory access.

The attack requires local access to the system or application that processes ABF files and user interaction to open the malicious file.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability is triggered by processing specially crafted ABF files with the libbiosig library. Detection involves identifying attempts to open or process suspicious or malformed ABF files locally on the system.'}, {'type': 'paragraph', 'content': 'Since the vulnerability arises from out-of-bounds reads during ABF file parsing, monitoring for application crashes or segmentation faults in programs using libbiosig when opening ABF files can be an indicator.'}, {'type': 'paragraph', 'content': 'There are no specific network commands to detect this vulnerability because the attack vector is local and requires user interaction with malicious files.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect potential exploitation attempts or presence of malicious ABF files include:'}, {'type': 'list_item', 'content': "Use file scanning commands to find ABF files: `find /path/to/data -type f -name '*.abf'`"}, {'type': 'list_item', 'content': "Check application logs or system logs for crashes related to libbiosig or applications processing ABF files: `grep -i 'segfault' /var/log/syslog` or `journalctl -xe`"}, {'type': 'list_item', 'content': 'Run the vulnerable application under a debugger or with memory error detection tools (e.g., Valgrind) to detect out-of-bounds reads when opening ABF files.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid processing untrusted or malicious ABF files with vulnerable versions of libbiosig (3.9.2 and the Master Branch commit 5462afb0).

If possible, update libbiosig to a version where this vulnerability is fixed once available.

Restrict access to systems and applications that process ABF files to trusted users only, minimizing the risk of malicious file introduction.

Implement file validation or scanning to detect malformed ABF files before processing.

Monitor applications for crashes or unusual behavior when handling ABF files and respond accordingly.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart