CVE-2025-47712: Integer Overflow or Wraparound
CVE-2025-47712 is an integer overflow vulnerability in the nbdkit "blocksize" filter used in Red Hat Enterprise Linux 10. It is triggered when a client requests block status information for an excessively large data range, causing an internal error that leads to denial of service. The flaw requires network access and low privileges but no user interaction. Exploitation results in service disruption without compromising confidentiality or integrity. No known exploits are currently in the wild. The vulnerability affects specific versions of nbdkit (1. 21. 16, 1. 40. 0, 1.
AI Analysis
Technical Summary
CVE-2025-47712 is a medium severity vulnerability identified in the nbdkit "blocksize" filter component, which is part of the network block device (NBD) server infrastructure used in Red Hat Enterprise Linux 10. The vulnerability arises from an integer overflow or wraparound condition triggered when a client issues a request for block status information covering a data range that exceeds an internal limit. This causes an internal error within nbdkit, leading to a denial of service (DoS) condition by crashing or halting the service. The flaw can be exploited remotely over the network (AV:N) with low attack complexity (AC:L) and requires low privileges (PR:L), but no user interaction (UI:N) is necessary. The scope is unchanged (S:U), and the impact is limited to availability (A:H) without affecting confidentiality or integrity. The affected versions include nbdkit 1.21.16, 1.40.0, and 1.42.0 running on Red Hat Enterprise Linux 10. No public exploits have been reported yet, but the vulnerability is publicly disclosed and assigned a CVSS v3.1 score of 6.5, reflecting a medium severity level. The root cause is an integer overflow in the blocksize filter logic, which mishandles large data range requests, leading to resource exhaustion or service crash. This vulnerability primarily threatens service availability, potentially disrupting storage or virtualization environments relying on nbdkit for block device access.
Potential Impact
For European organizations, the primary impact of CVE-2025-47712 is the risk of denial of service affecting systems that utilize nbdkit on Red Hat Enterprise Linux 10. This can disrupt critical storage services, virtualization platforms, or cloud infrastructure components that depend on NBD for remote block device access. Service outages could lead to operational downtime, impacting business continuity, especially in sectors like finance, telecommunications, and public services where high availability is essential. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can cause significant operational and reputational damage. Organizations with automated or remote storage management relying on nbdkit are particularly vulnerable. The absence of known exploits reduces immediate risk, but the medium severity rating and public disclosure necessitate prompt attention to prevent potential exploitation.
Mitigation Recommendations
To mitigate CVE-2025-47712, organizations should: 1) Monitor Red Hat and nbdkit vendor advisories closely and apply security patches or updates as soon as they become available to fix the integer overflow flaw. 2) Restrict network access to nbdkit services using firewall rules or network segmentation to limit exposure to untrusted clients. 3) Implement strict access controls and authentication mechanisms for clients interacting with nbdkit to reduce the risk of unauthorized requests. 4) Employ runtime monitoring and anomaly detection to identify unusual large block status requests that could indicate exploitation attempts. 5) Consider temporarily disabling or replacing the vulnerable blocksize filter if patching is delayed and the service is critical. 6) Conduct regular security assessments and penetration testing focusing on storage and virtualization components to detect similar vulnerabilities. These targeted steps go beyond generic advice by focusing on access restriction, monitoring, and vendor patching specific to nbdkit and Red Hat Enterprise Linux 10 environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-47712: Integer Overflow or Wraparound
Description
CVE-2025-47712 is an integer overflow vulnerability in the nbdkit "blocksize" filter used in Red Hat Enterprise Linux 10. It is triggered when a client requests block status information for an excessively large data range, causing an internal error that leads to denial of service. The flaw requires network access and low privileges but no user interaction. Exploitation results in service disruption without compromising confidentiality or integrity. No known exploits are currently in the wild. The vulnerability affects specific versions of nbdkit (1. 21. 16, 1. 40. 0, 1.
AI-Powered Analysis
Technical Analysis
CVE-2025-47712 is a medium severity vulnerability identified in the nbdkit "blocksize" filter component, which is part of the network block device (NBD) server infrastructure used in Red Hat Enterprise Linux 10. The vulnerability arises from an integer overflow or wraparound condition triggered when a client issues a request for block status information covering a data range that exceeds an internal limit. This causes an internal error within nbdkit, leading to a denial of service (DoS) condition by crashing or halting the service. The flaw can be exploited remotely over the network (AV:N) with low attack complexity (AC:L) and requires low privileges (PR:L), but no user interaction (UI:N) is necessary. The scope is unchanged (S:U), and the impact is limited to availability (A:H) without affecting confidentiality or integrity. The affected versions include nbdkit 1.21.16, 1.40.0, and 1.42.0 running on Red Hat Enterprise Linux 10. No public exploits have been reported yet, but the vulnerability is publicly disclosed and assigned a CVSS v3.1 score of 6.5, reflecting a medium severity level. The root cause is an integer overflow in the blocksize filter logic, which mishandles large data range requests, leading to resource exhaustion or service crash. This vulnerability primarily threatens service availability, potentially disrupting storage or virtualization environments relying on nbdkit for block device access.
Potential Impact
For European organizations, the primary impact of CVE-2025-47712 is the risk of denial of service affecting systems that utilize nbdkit on Red Hat Enterprise Linux 10. This can disrupt critical storage services, virtualization platforms, or cloud infrastructure components that depend on NBD for remote block device access. Service outages could lead to operational downtime, impacting business continuity, especially in sectors like finance, telecommunications, and public services where high availability is essential. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can cause significant operational and reputational damage. Organizations with automated or remote storage management relying on nbdkit are particularly vulnerable. The absence of known exploits reduces immediate risk, but the medium severity rating and public disclosure necessitate prompt attention to prevent potential exploitation.
Mitigation Recommendations
To mitigate CVE-2025-47712, organizations should: 1) Monitor Red Hat and nbdkit vendor advisories closely and apply security patches or updates as soon as they become available to fix the integer overflow flaw. 2) Restrict network access to nbdkit services using firewall rules or network segmentation to limit exposure to untrusted clients. 3) Implement strict access controls and authentication mechanisms for clients interacting with nbdkit to reduce the risk of unauthorized requests. 4) Employ runtime monitoring and anomaly detection to identify unusual large block status requests that could indicate exploitation attempts. 5) Consider temporarily disabling or replacing the vulnerable blocksize filter if patching is delayed and the service is critical. 6) Conduct regular security assessments and penetration testing focusing on storage and virtualization components to detect similar vulnerabilities. These targeted steps go beyond generic advice by focusing on access restriction, monitoring, and vendor patching specific to nbdkit and Red Hat Enterprise Linux 10 environments.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-07T21:08:45.449Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6846c60d7b622a9fdf1e7925
Added to database: 6/9/2025, 11:31:25 AM
Last enriched: 1/8/2026, 4:30:45 AM
Last updated: 1/8/2026, 6:57:08 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-22581
LowCVE-2026-22580
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.