Skip to main content

CVE-2025-2900: CWE-122 Heap-based Buffer Overflow in IBM Semeru Runtime

High
VulnerabilityCVE-2025-2900cvecve-2025-2900cwe-122
Published: Wed May 14 2025 (05/14/2025, 18:50:27 UTC)
Source: CVE
Vendor/Project: IBM
Product: Semeru Runtime

Description

IBM Semeru Runtime 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0 is vulnerable to a denial of service caused by a buffer overflow and subsequent crash, due to a defect in its native AES/CBC encryption implementation.

AI-Powered Analysis

AILast updated: 08/29/2025, 00:50:17 UTC

Technical Analysis

CVE-2025-2900 is a high-severity heap-based buffer overflow vulnerability (CWE-122) found in IBM Semeru Runtime versions 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0. The flaw arises from a defect in the native AES/CBC encryption implementation within the runtime environment. Specifically, the vulnerability allows an attacker to trigger a buffer overflow condition on the heap, which leads to a denial of service (DoS) by causing the affected process to crash. The vulnerability does not impact confidentiality or integrity directly but severely affects availability. The CVSS v3.1 base score is 7.5, reflecting a high severity level with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N, I:N), and high availability impact (A:H). There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability affects multiple major versions of IBM Semeru Runtime, which is an open-source Java runtime distribution based on OpenJDK, widely used for running Java applications. The heap-based buffer overflow in the AES/CBC encryption routine suggests that specially crafted inputs or data processed by the runtime can trigger the overflow, leading to crashes and service interruptions.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for enterprises relying on IBM Semeru Runtime to run critical Java applications, including financial services, telecommunications, manufacturing, and government services. A successful exploitation results in denial of service, causing application crashes and potential downtime. This can disrupt business operations, lead to loss of availability of key services, and impact customer trust and regulatory compliance, particularly under GDPR and other data protection frameworks that require service continuity. Since the vulnerability does not require authentication or user interaction and can be exploited remotely over the network, it increases the risk of automated attacks or wormable scenarios targeting exposed services. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not mitigate the operational risks caused by service outages. Organizations with large-scale Java deployments or those using IBM Semeru Runtime in cloud or containerized environments may face cascading failures if the runtime is embedded in multiple microservices or backend systems.

Mitigation Recommendations

European organizations should immediately inventory their environments to identify all instances of IBM Semeru Runtime within the affected version ranges. Until official patches are released, mitigation should focus on reducing exposure by restricting network access to services running on vulnerable runtimes, implementing strict firewall rules, and applying network segmentation to isolate critical systems. Monitoring and alerting should be enhanced to detect abnormal crashes or service disruptions indicative of exploitation attempts. Application-level mitigations include disabling or replacing the native AES/CBC encryption features if feasible or switching to alternative Java runtimes not affected by this vulnerability. Organizations should also prepare for rapid patch deployment once IBM releases fixes. Additionally, employing runtime application self-protection (RASP) or behavior-based anomaly detection can help identify exploitation attempts in real time. Finally, conducting penetration testing and vulnerability scanning focused on this CVE can help validate the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-03-28T02:06:38.367Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec888

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 8/29/2025, 12:50:17 AM

Last updated: 10/3/2025, 9:04:24 AM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats