Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14936: CWE-121: Stack-based Buffer Overflow in NSF Unidata NetCDF-C

0
High
VulnerabilityCVE-2025-14936cvecve-2025-14936cwe-121
Published: Tue Dec 23 2025 (12/23/2025, 21:08:40 UTC)
Source: CVE Database V5
Vendor/Project: NSF Unidata
Product: NetCDF-C

Description

NSF Unidata NetCDF-C Attribute Name Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NSF Unidata NetCDF-C. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of attribute names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27269.

AI-Powered Analysis

AILast updated: 12/31/2025, 00:14:35 UTC

Technical Analysis

CVE-2025-14936 is a stack-based buffer overflow vulnerability classified under CWE-121 found in NSF Unidata NetCDF-C, a widely used library for array-oriented scientific data. The vulnerability specifically exists in the parsing of attribute names, where the software fails to properly validate the length of user-supplied attribute name data before copying it into a fixed-length stack buffer. This lack of bounds checking allows an attacker to overflow the buffer, potentially overwriting the stack and enabling arbitrary code execution. Exploitation requires user interaction, such as opening a maliciously crafted NetCDF file or visiting a web page that triggers the vulnerable parsing code. The vulnerability has a CVSS 3.0 base score of 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required but user interaction necessary. The flaw allows remote attackers to execute code with the privileges of the current user, which could lead to full system compromise if the user has elevated rights. No public exploits have been reported yet, but the vulnerability is serious due to the widespread use of NetCDF-C in scientific, meteorological, and geospatial data processing environments. The vulnerability was assigned ZDI-CAN-27269 and published on December 23, 2025. The absence of patches at the time of reporting means organizations must rely on mitigations until updates are released.

Potential Impact

For European organizations, particularly research institutions, universities, meteorological agencies, and companies involved in geospatial and scientific data analysis, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized code execution, data breaches, manipulation of scientific data, disruption of critical research processes, and potential lateral movement within networks. The confidentiality of sensitive research data and intellectual property could be compromised. Integrity of datasets could be undermined, affecting research outcomes and decision-making. Availability of systems processing large scientific datasets could be impacted by crashes or malicious payloads. Given the reliance on NetCDF-C in many European scientific communities, the threat could disrupt collaborative projects and data sharing initiatives. The requirement for user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where users frequently handle external data files or web resources.

Mitigation Recommendations

Organizations should prioritize monitoring for updates from NSF Unidata and apply security patches as soon as they become available. Until patches are released, restrict the opening of NetCDF files from untrusted or unknown sources. Implement strict file validation and scanning procedures for incoming data files. Employ runtime protections such as stack canaries, ASLR, and DEP (Data Execution Prevention) to reduce exploitation likelihood. Educate users about the risks of opening files from untrusted sources and visiting suspicious web pages. Network segmentation can limit the impact of a compromised host. Use application whitelisting and endpoint detection and response (EDR) tools to detect anomalous behavior indicative of exploitation attempts. For environments with high security requirements, consider sandboxing applications that process NetCDF files to contain potential exploits. Regularly audit and update software dependencies to minimize exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-12-18T20:56:12.126Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b06504eddf7475afca1a4

Added to database: 12/23/2025, 9:14:56 PM

Last enriched: 12/31/2025, 12:14:35 AM

Last updated: 2/5/2026, 5:41:43 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats