CVE-2025-4001: Uncontrolled File Descriptor Consumption in scipopt scip
A vulnerability has been found in scipopt scip up to 9.2.1 and classified as problematic. Affected by this vulnerability is the function main of the file examples/LOP/src/genRandomLOPInstance.c of the component File Descriptor Handler. The manipulation of the argument File leads to uncontrolled file descriptor consumption. Local access is required to approach this attack. Upgrading to version 9.2.2 is able to address this issue. The identifier of the patch is d6da63b941216d75fbc1aefea9abf1de6712a2d0. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-4001 is a vulnerability identified in the scipopt SCIP software, specifically affecting versions 9.2.0 and 9.2.1. SCIP is a widely used optimization software framework for solving constraint integer programs, often employed in research, industrial optimization, and operations research. The vulnerability resides in the 'main' function of the file examples/LOP/src/genRandomLOPInstance.c, within the File Descriptor Handler component. The issue involves uncontrolled file descriptor consumption triggered by manipulation of the file argument. This means that the program can open an excessive number of file descriptors without proper limitation or closure, potentially exhausting system resources. The vulnerability requires local access with low privileges (local access with low privileges is sufficient), and no user interaction or authentication beyond local access is necessary. The CVSS 4.0 score is 4.8, indicating a medium severity level. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required beyond local access (PR:L), and no user interaction (UI:N). The impact is limited to availability (VA:L), with no confidentiality or integrity impact. Exploitation could lead to denial of service conditions by exhausting file descriptors, causing the application or system to fail to open new files or sockets. The issue is addressed in version 9.2.2 of SCIP, with the patch identified by commit d6da63b941216d75fbc1aefea9abf1de6712a2d0. No known exploits are currently reported in the wild. Given the nature of the vulnerability, exploitation is constrained to local users who have access to run the affected SCIP versions, and it does not propagate remotely or require network access.
Potential Impact
For European organizations using SCIP versions 9.2.0 or 9.2.1, this vulnerability poses a risk primarily to system availability. Since SCIP is used in optimization tasks that may be critical for logistics, manufacturing, finance, and research, uncontrolled file descriptor consumption could lead to denial of service (DoS) conditions, disrupting these operations. The impact is localized to the affected host and requires local access, limiting the risk of widespread disruption. However, in environments where SCIP is integrated into automated workflows or shared computational resources, an attacker or malfunctioning process could cause resource exhaustion, affecting availability of optimization services. This could delay decision-making processes or interrupt critical optimization computations. Confidentiality and integrity are not impacted, so data breaches or unauthorized data modification are not concerns here. The medium severity rating reflects the limited scope and local access requirement but acknowledges the potential operational disruption. Organizations relying heavily on SCIP for optimization should consider the risk of service interruption, especially in high-availability or production environments.
Mitigation Recommendations
1. Upgrade SCIP to version 9.2.2 or later immediately, as this version contains the patch that fixes the uncontrolled file descriptor consumption issue. 2. Implement strict access controls on systems running SCIP to limit local user access only to trusted personnel, reducing the risk of exploitation. 3. Monitor system resource usage, particularly file descriptor counts, on hosts running SCIP to detect abnormal consumption patterns early. 4. Employ operating system-level limits on the number of file descriptors per process (e.g., using ulimit on Linux) to prevent a single process from exhausting system-wide resources. 5. In environments where SCIP is used in automated or batch processing, incorporate watchdog or resource monitoring scripts to restart or alert on resource exhaustion conditions. 6. Review and restrict the use of example or test programs like genRandomLOPInstance.c in production environments, as these may be more prone to vulnerabilities or misuse. 7. Maintain an inventory of SCIP deployments across the organization to ensure all instances are identified and updated promptly. 8. Educate local users with access to SCIP about the risks of running untrusted inputs or scripts that could trigger resource exhaustion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Sweden, Belgium, Italy
CVE-2025-4001: Uncontrolled File Descriptor Consumption in scipopt scip
Description
A vulnerability has been found in scipopt scip up to 9.2.1 and classified as problematic. Affected by this vulnerability is the function main of the file examples/LOP/src/genRandomLOPInstance.c of the component File Descriptor Handler. The manipulation of the argument File leads to uncontrolled file descriptor consumption. Local access is required to approach this attack. Upgrading to version 9.2.2 is able to address this issue. The identifier of the patch is d6da63b941216d75fbc1aefea9abf1de6712a2d0. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-4001 is a vulnerability identified in the scipopt SCIP software, specifically affecting versions 9.2.0 and 9.2.1. SCIP is a widely used optimization software framework for solving constraint integer programs, often employed in research, industrial optimization, and operations research. The vulnerability resides in the 'main' function of the file examples/LOP/src/genRandomLOPInstance.c, within the File Descriptor Handler component. The issue involves uncontrolled file descriptor consumption triggered by manipulation of the file argument. This means that the program can open an excessive number of file descriptors without proper limitation or closure, potentially exhausting system resources. The vulnerability requires local access with low privileges (local access with low privileges is sufficient), and no user interaction or authentication beyond local access is necessary. The CVSS 4.0 score is 4.8, indicating a medium severity level. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required beyond local access (PR:L), and no user interaction (UI:N). The impact is limited to availability (VA:L), with no confidentiality or integrity impact. Exploitation could lead to denial of service conditions by exhausting file descriptors, causing the application or system to fail to open new files or sockets. The issue is addressed in version 9.2.2 of SCIP, with the patch identified by commit d6da63b941216d75fbc1aefea9abf1de6712a2d0. No known exploits are currently reported in the wild. Given the nature of the vulnerability, exploitation is constrained to local users who have access to run the affected SCIP versions, and it does not propagate remotely or require network access.
Potential Impact
For European organizations using SCIP versions 9.2.0 or 9.2.1, this vulnerability poses a risk primarily to system availability. Since SCIP is used in optimization tasks that may be critical for logistics, manufacturing, finance, and research, uncontrolled file descriptor consumption could lead to denial of service (DoS) conditions, disrupting these operations. The impact is localized to the affected host and requires local access, limiting the risk of widespread disruption. However, in environments where SCIP is integrated into automated workflows or shared computational resources, an attacker or malfunctioning process could cause resource exhaustion, affecting availability of optimization services. This could delay decision-making processes or interrupt critical optimization computations. Confidentiality and integrity are not impacted, so data breaches or unauthorized data modification are not concerns here. The medium severity rating reflects the limited scope and local access requirement but acknowledges the potential operational disruption. Organizations relying heavily on SCIP for optimization should consider the risk of service interruption, especially in high-availability or production environments.
Mitigation Recommendations
1. Upgrade SCIP to version 9.2.2 or later immediately, as this version contains the patch that fixes the uncontrolled file descriptor consumption issue. 2. Implement strict access controls on systems running SCIP to limit local user access only to trusted personnel, reducing the risk of exploitation. 3. Monitor system resource usage, particularly file descriptor counts, on hosts running SCIP to detect abnormal consumption patterns early. 4. Employ operating system-level limits on the number of file descriptors per process (e.g., using ulimit on Linux) to prevent a single process from exhausting system-wide resources. 5. In environments where SCIP is used in automated or batch processing, incorporate watchdog or resource monitoring scripts to restart or alert on resource exhaustion conditions. 6. Review and restrict the use of example or test programs like genRandomLOPInstance.c in production environments, as these may be more prone to vulnerabilities or misuse. 7. Maintain an inventory of SCIP deployments across the organization to ensure all instances are identified and updated promptly. 8. Educate local users with access to SCIP about the risks of running untrusted inputs or scripts that could trigger resource exhaustion.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-26T08:26:58.124Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983ec4522896dcbef946
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 6/24/2025, 6:22:52 PM
Last updated: 8/18/2025, 11:32:11 PM
Views: 19
Related Threats
CVE-2025-52337: n/a
UnknownCVE-2025-2988: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM Sterling B2B Integrator
LowCVE-2025-9154: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-55736: CWE-425: Direct Request ('Forced Browsing') in DogukanUrker FlaskBlog
CriticalCVE-2025-50891: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.