CVE-2025-10999: NULL Pointer Dereference in Open Babel
A vulnerability was found in Open Babel up to 3.1.1. The impacted element is the function CacaoFormat::SetHilderbrandt of the file /src/formats/cacaoformat.cpp. The manipulation results in null pointer dereference. The attack is only possible with local access. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-10999 is a medium-severity vulnerability identified in Open Babel versions 3.1.0 and 3.1.1. Open Babel is an open-source chemical toolbox designed to speak the many languages of chemical data. The vulnerability resides in the function CacaoFormat::SetHilderbrandt within the source file /src/formats/cacaoformat.cpp. Specifically, the issue is a NULL pointer dereference, which occurs when the function attempts to access or manipulate memory through a pointer that has not been properly initialized or has been set to NULL. This results in a program crash or denial of service. The vulnerability requires local access and low privileges (PR:L), meaning an attacker must have some level of access to the system to exploit it. No user interaction or authentication is required beyond local access. The CVSS 4.0 vector indicates low attack complexity and no privileges beyond local access are needed, but the impact is limited to availability (denial of service) with no confidentiality or integrity impact. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. The vulnerability does not affect confidentiality or integrity but can cause application crashes, potentially disrupting workflows that rely on Open Babel for chemical data processing. No patches or fixes have been linked yet, so users must monitor for updates or apply workarounds.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to availability. Organizations in pharmaceutical, chemical research, and academic sectors that utilize Open Babel for chemical data conversion and analysis could experience service interruptions or application crashes if this vulnerability is exploited. While the vulnerability does not lead to data breaches or unauthorized data modification, denial of service could disrupt critical research workflows or automated pipelines that depend on Open Babel, potentially causing delays or loss of productivity. Since exploitation requires local access, the threat is more relevant in environments where multiple users have access to the same systems or where attackers can gain initial footholds through other means. The public availability of an exploit increases the risk that attackers with local access could leverage this vulnerability to cause disruptions. However, the limited scope and requirement for local access reduce the likelihood of widespread impact across European organizations unless combined with other attack vectors.
Mitigation Recommendations
1. Restrict local access to systems running Open Babel to trusted users only, implementing strict access controls and user account management. 2. Monitor systems for unusual crashes or application failures related to Open Babel, which could indicate exploitation attempts. 3. Employ application whitelisting and endpoint protection to detect and prevent exploitation attempts. 4. Until an official patch is released, consider isolating Open Babel usage to dedicated environments or containers to limit the blast radius of potential crashes. 5. Regularly check Open Babel project repositories and security advisories for patches or updates addressing this vulnerability and apply them promptly. 6. Educate users with local access about the risks and encourage reporting of any abnormal application behavior. 7. Implement system-level protections such as memory protection mechanisms (e.g., ASLR, DEP) to mitigate the impact of null pointer dereferences.
Affected Countries
Germany, France, United Kingdom, Switzerland, Netherlands, Belgium, Italy, Sweden
CVE-2025-10999: NULL Pointer Dereference in Open Babel
Description
A vulnerability was found in Open Babel up to 3.1.1. The impacted element is the function CacaoFormat::SetHilderbrandt of the file /src/formats/cacaoformat.cpp. The manipulation results in null pointer dereference. The attack is only possible with local access. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10999 is a medium-severity vulnerability identified in Open Babel versions 3.1.0 and 3.1.1. Open Babel is an open-source chemical toolbox designed to speak the many languages of chemical data. The vulnerability resides in the function CacaoFormat::SetHilderbrandt within the source file /src/formats/cacaoformat.cpp. Specifically, the issue is a NULL pointer dereference, which occurs when the function attempts to access or manipulate memory through a pointer that has not been properly initialized or has been set to NULL. This results in a program crash or denial of service. The vulnerability requires local access and low privileges (PR:L), meaning an attacker must have some level of access to the system to exploit it. No user interaction or authentication is required beyond local access. The CVSS 4.0 vector indicates low attack complexity and no privileges beyond local access are needed, but the impact is limited to availability (denial of service) with no confidentiality or integrity impact. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. The vulnerability does not affect confidentiality or integrity but can cause application crashes, potentially disrupting workflows that rely on Open Babel for chemical data processing. No patches or fixes have been linked yet, so users must monitor for updates or apply workarounds.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to availability. Organizations in pharmaceutical, chemical research, and academic sectors that utilize Open Babel for chemical data conversion and analysis could experience service interruptions or application crashes if this vulnerability is exploited. While the vulnerability does not lead to data breaches or unauthorized data modification, denial of service could disrupt critical research workflows or automated pipelines that depend on Open Babel, potentially causing delays or loss of productivity. Since exploitation requires local access, the threat is more relevant in environments where multiple users have access to the same systems or where attackers can gain initial footholds through other means. The public availability of an exploit increases the risk that attackers with local access could leverage this vulnerability to cause disruptions. However, the limited scope and requirement for local access reduce the likelihood of widespread impact across European organizations unless combined with other attack vectors.
Mitigation Recommendations
1. Restrict local access to systems running Open Babel to trusted users only, implementing strict access controls and user account management. 2. Monitor systems for unusual crashes or application failures related to Open Babel, which could indicate exploitation attempts. 3. Employ application whitelisting and endpoint protection to detect and prevent exploitation attempts. 4. Until an official patch is released, consider isolating Open Babel usage to dedicated environments or containers to limit the blast radius of potential crashes. 5. Regularly check Open Babel project repositories and security advisories for patches or updates addressing this vulnerability and apply them promptly. 6. Educate users with local access about the risks and encourage reporting of any abnormal application behavior. 7. Implement system-level protections such as memory protection mechanisms (e.g., ASLR, DEP) to mitigate the impact of null pointer dereferences.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-25T18:05:06.531Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d6062c9e21be37e93acc3e
Added to database: 9/26/2025, 3:19:08 AM
Last enriched: 9/26/2025, 3:34:41 AM
Last updated: 10/1/2025, 12:09:21 AM
Views: 8
Related Threats
CVE-2025-9512: CWE-79 Cross-Site Scripting (XSS) in Schema & Structured Data for WP & AMP
HighCVE-2025-10538: CWE-288: Authentication Bypass Using an Alternate Path or Channel in LG Innotek Camera Model LND7210
HighCVE-2025-9075: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bdthemes ZoloBlocks – Gutenberg Block Editor Plugin with Advanced Blocks, Dynamic Content, Templates & Patterns
MediumCVE-2025-10744: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover File Manager, Code Editor, and Backup by Managefy
MediumCVE-2025-10735: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Block For Mailchimp – Easy Mailchimp Form Integration
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.