Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23310: CWE-825: Expired Pointer Dereference in The Biosig Project libbiosig

0
Critical
VulnerabilityCVE-2024-23310cvecve-2024-23310cwe-825
Published: Tue Feb 20 2024 (02/20/2024, 15:29:31 UTC)
Source: CVE Database V5
Vendor/Project: The Biosig Project
Product: libbiosig

Description

A use-after-free vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:12:44 UTC

Technical Analysis

CVE-2024-23310 is a use-after-free vulnerability classified under CWE-825 found in The Biosig Project's libbiosig library, specifically in the sopen_FAMOS_read function. The vulnerability exists in version 2.5.0 and the master branch (commit ab0ee111). The flaw arises when the library processes specially crafted .famos files, which are used for biomedical signal data. Due to improper handling of memory, an expired pointer is dereferenced after the memory it points to has been freed, leading to undefined behavior. This can be exploited by an attacker who supplies a malicious .famos file to trigger arbitrary code execution in the context of the application using libbiosig. The vulnerability requires no privileges and no user interaction, and it can be exploited remotely by convincing a target to open or process the malicious file. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. Although no public exploits are known at this time, the vulnerability's characteristics make it a prime candidate for exploitation once weaponized. The Biosig Project is widely used in biomedical signal processing applications, which are often integrated into healthcare and research environments, increasing the potential impact of this vulnerability.

Potential Impact

For European organizations, the impact of CVE-2024-23310 is significant, especially those involved in biomedical research, healthcare, and medical device manufacturing that rely on libbiosig for signal processing. Exploitation could lead to full system compromise, data breaches involving sensitive patient or research data, and disruption of critical healthcare services. The arbitrary code execution capability means attackers could implant malware, exfiltrate data, or disrupt operations. Given the critical nature of healthcare infrastructure in Europe and stringent data protection regulations such as GDPR, exploitation could result in severe legal, financial, and reputational damage. Additionally, compromised biomedical devices or research systems could undermine public health and safety. The lack of known exploits currently provides a window for proactive mitigation, but the ease of exploitation and high impact necessitate urgent attention.

Mitigation Recommendations

1. Immediately restrict or block the processing of untrusted or unauthenticated .famos files within applications using libbiosig. 2. Monitor and audit file inputs to detect anomalous or malformed .famos files. 3. Employ application-level sandboxing or containerization to limit the impact of potential exploitation. 4. Use memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to reduce exploitation success. 5. Engage with The Biosig Project community or maintainers to obtain patches or updates addressing this vulnerability as soon as they become available. 6. Conduct thorough code reviews and testing of applications integrating libbiosig to identify and remediate unsafe file handling. 7. Implement network-level controls to prevent delivery of malicious files via email or file-sharing platforms. 8. Educate relevant personnel about the risks of opening untrusted biomedical data files.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-01-23T13:26:50.009Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a475b6d939959c8022d04

Added to database: 11/4/2025, 6:35:07 PM

Last enriched: 11/4/2025, 7:12:44 PM

Last updated: 11/5/2025, 2:03:26 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats