Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23016: CWE-190 Integer Overflow or Wraparound in FastCGI fcgi

0
Critical
VulnerabilityCVE-2025-23016cvecve-2025-23016cwe-190
Published: Fri Jan 10 2025 (01/10/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: FastCGI
Product: fcgi

Description

FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.

AI-Powered Analysis

AILast updated: 09/19/2025, 15:33:28 UTC

Technical Analysis

CVE-2025-23016 is a critical vulnerability identified in FastCGI's fcgi2 implementation, specifically versions 2.0.0 through 2.4.4. The flaw arises from an integer overflow condition in the ReadParams function within the fcgiapp.c source file. This function processes FastCGI parameters, including nameLen and valueLen fields, which specify the lengths of parameter names and values communicated over the IPC socket. An attacker can craft malicious FastCGI requests with specially manipulated nameLen or valueLen values that trigger an integer overflow. This overflow leads to a heap-based buffer overflow, allowing the attacker to overwrite memory beyond the intended buffer boundaries. The vulnerability is exploitable without any authentication or user interaction, and the attack vector requires local access (AV:L), meaning the attacker must have the ability to send data to the IPC socket locally. The consequences of successful exploitation are severe, as indicated by the CVSS 3.1 score of 9.3 (critical), with high impact on confidentiality, integrity, and availability. Exploiting this vulnerability could enable arbitrary code execution, privilege escalation, or denial of service on systems running vulnerable FastCGI versions. No public exploits are currently known in the wild, but the critical nature and ease of exploitation without privileges make it a significant threat. The vulnerability is rooted in CWE-190 (Integer Overflow or Wraparound), a common programming error that leads to memory corruption when integer calculations exceed their maximum representable value, causing buffer size miscalculations and subsequent overflows.

Potential Impact

For European organizations, the impact of CVE-2025-23016 can be substantial, especially for those relying on FastCGI-based web infrastructure. FastCGI is widely used to improve web server performance by interfacing with application servers, often in PHP or other dynamic content environments. Exploitation could lead to full system compromise, data breaches involving sensitive personal or corporate data, service outages, and disruption of critical web services. Given the criticality, attackers could leverage this vulnerability to implant persistent malware, conduct espionage, or disrupt operations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitive nature of their data and services. The local attack vector implies that attackers need some level of access to the internal network or compromised hosts, which could be achieved through phishing, insider threats, or lateral movement after initial compromise. The vulnerability’s ability to compromise confidentiality, integrity, and availability simultaneously elevates the risk profile for European entities, potentially triggering regulatory and compliance consequences under GDPR and other data protection laws.

Mitigation Recommendations

To mitigate CVE-2025-23016, European organizations should prioritize the following actions: 1) Immediate patching or upgrading to a FastCGI version that addresses this integer overflow vulnerability once available. Since no patch links are currently provided, organizations should monitor vendor advisories closely. 2) Restrict access to the FastCGI IPC socket to trusted processes and users only, employing strict filesystem permissions and access controls to prevent unauthorized local access. 3) Implement network segmentation and host-based firewalls to limit exposure of systems running FastCGI to untrusted users or networks, reducing the risk of local exploitation. 4) Employ runtime protections such as Address Space Layout Randomization (ASLR), stack canaries, and heap protections to mitigate exploitation impact. 5) Conduct thorough code audits and fuzz testing on FastCGI parameter handling in custom or legacy deployments to identify similar vulnerabilities. 6) Monitor system logs and network traffic for anomalous FastCGI requests or suspicious IPC socket activity indicative of exploitation attempts. 7) Educate internal teams on the risk of local privilege escalation vectors and enforce strong endpoint security to prevent initial footholds that could lead to local access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1098

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 9/19/2025, 3:33:28 PM

Last updated: 10/16/2025, 3:21:30 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats