Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23313: CWE-191: Integer Underflow (Wrap or Wraparound) in The Biosig Project libbiosig

0
Critical
VulnerabilityCVE-2024-23313cvecve-2024-23313cwe-191
Published: Tue Feb 20 2024 (02/20/2024, 15:29:32 UTC)
Source: CVE Database V5
Vendor/Project: The Biosig Project
Product: libbiosig

Description

An integer underflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to an out-of-bounds write which in turn can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:11:46 UTC

Technical Analysis

CVE-2024-23313 is an integer underflow vulnerability classified under CWE-191 found in the sopen_FAMOS_read function of The Biosig Project's libbiosig library, specifically in versions 2.5.0 and the Master Branch (ab0ee111). The vulnerability arises when processing specially crafted .famos files, a format used for biosignal data, which causes an integer underflow leading to an out-of-bounds write operation. This memory corruption can be exploited by an attacker to execute arbitrary code on the affected system. The flaw does not require any privileges or user interaction, making remote exploitation feasible if the attacker can supply a malicious .famos file to the target application using libbiosig. The CVSS v3.1 base score is 9.8, reflecting critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact spans confidentiality, integrity, and availability, as arbitrary code execution could lead to full system compromise. No public exploits are currently known, but the vulnerability's nature and severity demand urgent attention. The Biosig Project is a specialized open-source library used primarily in biomedical signal processing, so affected systems are typically found in healthcare, research institutions, and related industries. The lack of available patches at the time of publication increases risk, necessitating interim mitigations.

Potential Impact

For European organizations, the impact of CVE-2024-23313 is significant, especially for those in healthcare, biomedical research, and related technology sectors that utilize libbiosig for biosignal data processing. Exploitation could lead to full system compromise, exposing sensitive patient data, disrupting critical research workflows, or enabling attackers to pivot within networks. This could result in data breaches, loss of data integrity, operational downtime, and potential regulatory penalties under GDPR due to compromised personal health information. The ability to execute arbitrary code remotely without authentication increases the risk of widespread exploitation if malicious .famos files are introduced via network shares, email attachments, or compromised data repositories. Given the specialized nature of the software, targeted attacks against research institutions or medical device manufacturers are plausible, potentially impacting public health and safety. The absence of known exploits currently provides a window for proactive defense, but the critical severity score demands immediate risk management.

Mitigation Recommendations

1. Monitor official Biosig Project channels for patches or updates addressing CVE-2024-23313 and apply them promptly once available. 2. Until patches are released, restrict the acceptance and processing of .famos files to trusted sources only, implementing strict validation and sanitization of input files. 3. Employ application-level sandboxing or containerization to isolate libbiosig usage and limit the impact of potential exploitation. 4. Use runtime memory protection technologies such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and Control Flow Integrity (CFI) to mitigate exploitation attempts. 5. Conduct thorough code audits and fuzz testing on the sopen_FAMOS_read functionality if custom or extended versions of libbiosig are in use. 6. Implement network-level controls to detect and block suspicious file transfers involving .famos files, including email filtering and intrusion detection systems tuned for anomalous biosignal file activity. 7. Educate relevant staff on the risks of opening untrusted biosignal files and enforce strict operational security policies around data handling in biomedical environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-01-23T13:21:21.706Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a475b6d939959c8022d09

Added to database: 11/4/2025, 6:35:07 PM

Last enriched: 11/4/2025, 7:11:46 PM

Last updated: 12/17/2025, 11:27:07 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats