Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11964: CWE-787 Out-of-bounds Write in The Tcpdump Group libpcap

0
Low
VulnerabilityCVE-2025-11964cvecve-2025-11964cwe-787
Published: Wed Dec 31 2025 (12/31/2025, 00:58:19 UTC)
Source: CVE Database V5
Vendor/Project: The Tcpdump Group
Product: libpcap

Description

CVE-2025-11964 is a low-severity out-of-bounds write vulnerability in libpcap version 1. 10. 0 on Windows systems. It occurs when converting Windows error messages containing 4-byte UTF-8 characters, causing the function utf_16le_to_utf_8_truncated() to write beyond the allocated buffer. Exploitation requires local privileges and high authentication, with no user interaction needed. The vulnerability impacts integrity but not confidentiality or availability. No known exploits exist in the wild, and no patches have been published yet. European organizations using libpcap on Windows, especially in network monitoring or security appliances, should be aware but face limited risk due to the low severity and exploitation complexity. Mitigation involves monitoring for updates from The Tcpdump Group and restricting privileged access to vulnerable systems. Countries with significant IT infrastructure and high usage of Windows-based network tools, such as Germany, France, and the UK, are more likely to be affected.

AI-Powered Analysis

AILast updated: 12/31/2025, 01:44:05 UTC

Technical Analysis

CVE-2025-11964 is an out-of-bounds write vulnerability classified under CWE-787, affecting libpcap version 1.10.0 on Windows platforms. Libpcap is a widely used packet capture library integral to many network monitoring and security tools. The vulnerability arises specifically during the conversion of Windows error messages to UTF-8 encoding. When the error message contains characters that UTF-8 encodes using 4 bytes, the function utf_16le_to_utf_8_truncated() may write data beyond the end of the allocated buffer. This buffer overflow can corrupt adjacent memory, potentially leading to integrity issues such as data corruption or application crashes. The vulnerability requires local access with high privileges (PR:H) and has a high attack complexity (AC:H), meaning exploitation is difficult and unlikely to be automated. No user interaction is required, and the scope is unchanged (S:U). The CVSS v3.1 base score is 1.9, reflecting the low impact on confidentiality and availability, with limited integrity impact. No known exploits have been reported in the wild, and no patches have been released at the time of publication. This vulnerability is specific to Windows due to the handling of Windows error messages and UTF-8 conversion logic.

Potential Impact

For European organizations, the impact of CVE-2025-11964 is limited due to its low severity and exploitation requirements. The vulnerability could cause integrity issues in applications relying on libpcap for packet capture on Windows, potentially leading to application instability or data corruption. However, since exploitation requires local privileged access, the risk of remote compromise is minimal. Organizations using Windows-based network monitoring tools or security appliances that embed libpcap version 1.10.0 could experience disruptions if the vulnerability is triggered. The absence of known exploits reduces immediate risk, but the potential for targeted attacks in high-security environments exists. The impact on confidentiality and availability is negligible, so critical infrastructure and sensitive data are unlikely to be directly compromised through this vulnerability alone.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Inventory and identify all Windows systems running libpcap version 1.10.0, particularly those used for network monitoring or security analysis. 2) Restrict local administrative and privileged access to these systems to minimize the risk of exploitation. 3) Monitor official channels from The Tcpdump Group for patches or updates addressing this vulnerability and apply them promptly once available. 4) Employ application whitelisting and endpoint protection to detect anomalous behavior that could indicate exploitation attempts. 5) Conduct regular security audits and vulnerability scans focusing on local privilege escalation vectors. 6) Consider isolating or sandboxing network capture tools to limit the impact of potential memory corruption. 7) Educate system administrators about the vulnerability and the importance of minimizing privileged access on affected systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Tcpdump
Date Reserved
2025-10-20T14:43:15.180Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69547c56db813ff03e760a65

Added to database: 12/31/2025, 1:28:54 AM

Last enriched: 12/31/2025, 1:44:05 AM

Last updated: 12/31/2025, 4:07:37 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats