Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47711: Off-by-one Error

0
Medium
VulnerabilityCVE-2025-47711cvecve-2025-47711
Published: Mon Jun 09 2025 (06/09/2025, 06:03:47 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

There's a flaw in the nbdkit server when handling responses from its plugins regarding the status of data blocks. If a client makes a specific request for a very large data range, and a plugin responds with an even larger single block, the nbdkit server can encounter a critical internal error, leading to a denial-of-service.

AI-Powered Analysis

AILast updated: 11/08/2025, 07:47:32 UTC

Technical Analysis

CVE-2025-47711 is an off-by-one error vulnerability identified in the nbdkit server component, which is part of Red Hat Enterprise Linux 10 distributions (versions 1.11.10, 1.40.0, and 1.42.0). The nbdkit server acts as a network block device server that allows plugins to provide data blocks to clients. The vulnerability arises when the server handles plugin responses about the status of data blocks. Specifically, if a client issues a request for a very large data range, and the plugin responds with a single data block that is even larger than the requested range, the server's internal logic fails to correctly handle this scenario due to an off-by-one error. This leads to a critical internal error within the nbdkit server, causing it to crash or become unresponsive, resulting in a denial-of-service (DoS) condition. The vulnerability requires an attacker to have network access and low complexity privileges (PR:L), but no user interaction is needed. The flaw does not affect confidentiality or integrity but impacts availability by disrupting the service. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild. The medium CVSS score of 4.3 reflects the moderate impact and limited exploitability. This vulnerability is particularly relevant for environments where nbdkit is used to serve large data blocks over the network, such as in virtualization or storage infrastructure.

Potential Impact

For European organizations, the primary impact of CVE-2025-47711 is the potential disruption of services relying on the nbdkit server, which is commonly used in virtualization and storage solutions within enterprise Linux environments. A successful exploitation can cause denial-of-service, leading to downtime of critical infrastructure components, impacting business continuity and operational efficiency. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect cloud service providers, data centers, and enterprises using Red Hat Enterprise Linux 10 with nbdkit for network block device services. This can be particularly critical for sectors such as finance, healthcare, telecommunications, and government services where high availability is essential. Additionally, the requirement for low-level privileges means insider threats or compromised accounts could exploit this vulnerability to disrupt services. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2025-47711, European organizations should: 1) Monitor Red Hat advisories closely and apply patches or updates for nbdkit as soon as they become available. 2) Restrict network access to nbdkit servers to trusted clients only, using network segmentation and firewall rules to limit exposure. 3) Implement strict access controls and privilege management to minimize the risk of low-privilege accounts being used to exploit the vulnerability. 4) Monitor nbdkit server logs and system behavior for signs of crashes or abnormal terminations that could indicate exploitation attempts. 5) Consider deploying runtime protections or application-level monitoring to detect anomalous plugin responses or unusually large data block requests. 6) In environments where patching is delayed, consider disabling or limiting the use of nbdkit plugins that handle large data ranges or implementing rate limiting on client requests to reduce the risk of triggering the vulnerability. 7) Conduct regular vulnerability assessments and penetration testing focusing on network block device services to identify potential exploitation vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-07T21:08:45.449Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6846c60d7b622a9fdf1e7923

Added to database: 6/9/2025, 11:31:25 AM

Last enriched: 11/8/2025, 7:47:32 AM

Last updated: 11/22/2025, 7:33:28 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats