CVE-2025-47712: Integer Overflow or Wraparound
A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.
AI Analysis
Technical Summary
CVE-2025-47712 identifies an integer overflow or wraparound vulnerability in the "blocksize" filter component of nbdkit, a toolkit for creating Network Block Device (NBD) servers. The vulnerability is triggered when a client sends a request for block status information covering an excessively large data range that exceeds internal limits. This causes an integer overflow or wraparound condition within nbdkit's internal calculations, leading to an error state that crashes the nbdkit process. The crash results in a denial of service (DoS) condition, disrupting access to virtual block devices served by nbdkit. The affected versions include 1.21.16, 1.40.0, and 1.42.0, commonly deployed on Red Hat Enterprise Linux 10 systems. The flaw requires network-level access and low privileges (PR:L), but no user interaction is needed. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) reflects that the attack can be launched remotely with low complexity, does not affect confidentiality or integrity, but fully impacts availability. No public exploits or active exploitation have been reported to date. The root cause is insufficient validation of client-supplied block range parameters, allowing integer overflow during internal arithmetic operations. This vulnerability can disrupt storage services relying on nbdkit, affecting virtualized environments and storage appliances that use NBD protocols.
Potential Impact
The primary impact of CVE-2025-47712 is denial of service, which can interrupt critical storage services relying on nbdkit for network block device provisioning. Organizations using nbdkit in virtualization, cloud infrastructure, or storage appliances may experience service outages, impacting availability of virtual disks or storage volumes. Although confidentiality and integrity are not compromised, the loss of availability can disrupt business operations, cause downtime, and potentially lead to cascading failures in dependent systems. The ease of exploitation via network requests and lack of user interaction requirements increase the risk of automated or targeted DoS attacks. Enterprises with large-scale deployments of Red Hat Enterprise Linux 10 and nbdkit are particularly vulnerable. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time. The vulnerability could be leveraged in multi-stage attacks to degrade infrastructure resilience or as a distraction while other attacks are conducted.
Mitigation Recommendations
To mitigate CVE-2025-47712, organizations should promptly apply vendor patches or updates to nbdkit versions that address the integer overflow in the blocksize filter. If patches are not immediately available, consider disabling or restricting access to the blocksize filter functionality or limiting client requests to trusted networks only. Implement network-level controls such as firewall rules or intrusion prevention systems to block suspicious or abnormally large block status requests targeting nbdkit services. Monitor logs and network traffic for unusual patterns indicative of exploitation attempts. Employ rate limiting on NBD service endpoints to reduce the risk of DoS attacks. Additionally, conduct regular vulnerability scanning and penetration testing focused on storage virtualization components. Maintain an incident response plan to quickly recover from potential service disruptions caused by exploitation of this vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, China, India, Canada, Australia
CVE-2025-47712: Integer Overflow or Wraparound
Description
A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-47712 identifies an integer overflow or wraparound vulnerability in the "blocksize" filter component of nbdkit, a toolkit for creating Network Block Device (NBD) servers. The vulnerability is triggered when a client sends a request for block status information covering an excessively large data range that exceeds internal limits. This causes an integer overflow or wraparound condition within nbdkit's internal calculations, leading to an error state that crashes the nbdkit process. The crash results in a denial of service (DoS) condition, disrupting access to virtual block devices served by nbdkit. The affected versions include 1.21.16, 1.40.0, and 1.42.0, commonly deployed on Red Hat Enterprise Linux 10 systems. The flaw requires network-level access and low privileges (PR:L), but no user interaction is needed. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) reflects that the attack can be launched remotely with low complexity, does not affect confidentiality or integrity, but fully impacts availability. No public exploits or active exploitation have been reported to date. The root cause is insufficient validation of client-supplied block range parameters, allowing integer overflow during internal arithmetic operations. This vulnerability can disrupt storage services relying on nbdkit, affecting virtualized environments and storage appliances that use NBD protocols.
Potential Impact
The primary impact of CVE-2025-47712 is denial of service, which can interrupt critical storage services relying on nbdkit for network block device provisioning. Organizations using nbdkit in virtualization, cloud infrastructure, or storage appliances may experience service outages, impacting availability of virtual disks or storage volumes. Although confidentiality and integrity are not compromised, the loss of availability can disrupt business operations, cause downtime, and potentially lead to cascading failures in dependent systems. The ease of exploitation via network requests and lack of user interaction requirements increase the risk of automated or targeted DoS attacks. Enterprises with large-scale deployments of Red Hat Enterprise Linux 10 and nbdkit are particularly vulnerable. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time. The vulnerability could be leveraged in multi-stage attacks to degrade infrastructure resilience or as a distraction while other attacks are conducted.
Mitigation Recommendations
To mitigate CVE-2025-47712, organizations should promptly apply vendor patches or updates to nbdkit versions that address the integer overflow in the blocksize filter. If patches are not immediately available, consider disabling or restricting access to the blocksize filter functionality or limiting client requests to trusted networks only. Implement network-level controls such as firewall rules or intrusion prevention systems to block suspicious or abnormally large block status requests targeting nbdkit services. Monitor logs and network traffic for unusual patterns indicative of exploitation attempts. Employ rate limiting on NBD service endpoints to reduce the risk of DoS attacks. Additionally, conduct regular vulnerability scanning and penetration testing focused on storage virtualization components. Maintain an incident response plan to quickly recover from potential service disruptions caused by exploitation of this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-07T21:08:45.449Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6846c60d7b622a9fdf1e7925
Added to database: 6/9/2025, 11:31:25 AM
Last enriched: 2/27/2026, 2:07:48 PM
Last updated: 3/21/2026, 8:02:53 PM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.