Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14933: CWE-190: Integer Overflow or Wraparound in NSF Unidata NetCDF-C

0
High
VulnerabilityCVE-2025-14933cvecve-2025-14933cwe-190
Published: Tue Dec 23 2025 (12/23/2025, 21:09:15 UTC)
Source: CVE Database V5
Vendor/Project: NSF Unidata
Product: NetCDF-C

Description

NSF Unidata NetCDF-C NC Variable Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NSF Unidata NetCDF-C. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of NC variables. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27266.

AI-Powered Analysis

AILast updated: 12/31/2025, 00:12:25 UTC

Technical Analysis

CVE-2025-14933 is an integer overflow vulnerability classified under CWE-190, found in the NSF Unidata NetCDF-C library, which is widely used for array-oriented scientific data formats. The vulnerability occurs during the parsing of NC variables when user-supplied data is not properly validated, leading to an integer overflow before buffer allocation. This overflow can cause the program to allocate insufficient memory, enabling an attacker to overwrite memory regions and execute arbitrary code remotely. Exploitation requires user interaction, such as opening a crafted malicious NetCDF file or visiting a malicious webpage that triggers the parsing process. The vulnerability does not require prior authentication and has a CVSS 3.0 score of 7.8, indicating high severity with impacts on confidentiality, integrity, and availability. The attack vector is local (AV:L), but the low attack complexity and no privileges required make it a significant threat. The flaw was reported by ZDI (ZDI-CAN-27266) and is currently published without known exploits in the wild. The lack of patches at the time of reporting necessitates immediate attention to mitigate risk. The vulnerability is particularly critical for environments processing scientific data, meteorological models, or geospatial information where NetCDF-C is prevalent.

Potential Impact

For European organizations, especially those in scientific research, meteorology, climate science, and geospatial data processing, this vulnerability poses a significant risk. Successful exploitation could lead to arbitrary code execution, resulting in data breaches, manipulation of critical scientific data, disruption of research activities, and potential loss of data integrity and availability. Given the reliance on NetCDF-C in many European research institutions and government agencies, the impact could extend to national weather services, environmental monitoring, and academic research, potentially undermining trust in scientific outputs. The requirement for user interaction limits mass exploitation but targeted attacks against high-value research targets remain a concern. Additionally, compromised systems could be used as footholds for further lateral movement within networks, increasing the overall risk posture of affected organizations.

Mitigation Recommendations

Organizations should monitor NSF Unidata advisories closely and apply patches or updates as soon as they become available. Until patches are released, restrict the opening of NetCDF files from untrusted or unknown sources, and educate users about the risks of opening files from unverified origins. Employ application whitelisting and sandboxing techniques to limit the execution context of NetCDF-C processing applications. Implement runtime protections such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and control flow integrity to reduce exploitation success. Network segmentation can help contain potential breaches. Additionally, conduct regular security assessments of systems handling scientific data and monitor for unusual behavior indicative of exploitation attempts. Collaborate with software vendors and research communities to prioritize remediation and share threat intelligence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-12-18T20:56:01.434Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b06504eddf7475afca19b

Added to database: 12/23/2025, 9:14:56 PM

Last enriched: 12/31/2025, 12:12:25 AM

Last updated: 2/7/2026, 10:23:40 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats