Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46399: NULL Pointer Dereference

0
Medium
VulnerabilityCVE-2025-46399cvecve-2025-46399
Published: Wed Apr 23 2025 (04/23/2025, 20:55:15 UTC)
Source: CVE

Description

A flaw was found in fig2dev. This vulnerability allows availability via local input manipulation via genge_itp_spline function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:06:33 UTC

Technical Analysis

CVE-2025-46399 identifies a NULL pointer dereference vulnerability within the fig2dev software, specifically in the genge_itp_spline function. Fig2dev is a component of the Xfig suite used for converting figure files into various formats. The vulnerability arises when local input data is manipulated to trigger a NULL pointer dereference, causing the application to crash and resulting in a denial of service condition. The CVSS 3.1 base score of 5.5 reflects a medium severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects integrity (I:H) but not confidentiality or availability, which is unusual given the description; this may indicate some data corruption or processing integrity issues during exploitation. No known exploits have been reported in the wild, and no patches or vendor advisories are currently available. The vulnerability is primarily a stability and availability concern for local users of fig2dev, potentially impacting workflows that rely on this tool for figure conversions.

Potential Impact

The primary impact of CVE-2025-46399 is a denial of service through application crashes caused by local input manipulation. Organizations using fig2dev in their workflows may experience interruptions or failures in figure conversion processes, which could delay documentation, publishing, or other dependent tasks. Since exploitation requires local access and low privileges, the threat is mostly relevant in environments where multiple users share systems or where attackers have gained limited local access. There is no direct impact on confidentiality, but the integrity impact suggests potential data corruption or erroneous processing results, which could affect the accuracy of converted figures. The lack of remote exploitability limits the threat scope, but internal users or attackers with foothold could disrupt operations. The absence of patches increases risk until remediation is available.

Mitigation Recommendations

To mitigate CVE-2025-46399, organizations should restrict local access to systems running fig2dev to trusted users only and monitor for unusual application crashes or errors related to figure conversion processes. Employing application whitelisting and limiting user privileges can reduce the risk of exploitation. Until a patch is released, consider isolating fig2dev usage to dedicated environments or containers to contain potential crashes. Review and validate input data to fig2dev where possible to detect malformed or malicious inputs. Additionally, maintain regular backups of critical data and conversion outputs to recover from potential disruptions. Stay alert for vendor advisories or patches and apply updates promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-23T20:32:36.307Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec4ac

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 2/27/2026, 2:06:33 PM

Last updated: 3/22/2026, 6:52:02 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses