CVE-2025-47712: Integer Overflow or Wraparound
A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.
AI Analysis
Technical Summary
CVE-2025-47712 is an integer overflow or wraparound vulnerability found in the "blocksize" filter of nbdkit, a network block device server used to provide virtual block devices over a network. The vulnerability occurs when a client issues a request for block status information covering a very large data range that exceeds internal limits. This causes an integer overflow or wraparound in the calculation of the data size or block count, leading to an internal error within nbdkit. The result is a denial of service (DoS) condition where the nbdkit process crashes or becomes unresponsive, disrupting access to the virtual block device. The vulnerability affects specific versions of nbdkit (1.21.16, 1.40.0, 1.42.0) running on Red Hat Enterprise Linux 10. Exploitation requires network access and low privileges (PR:L), but no user interaction is needed. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. No known exploits have been reported in the wild as of the publication date. The flaw stems from insufficient validation of client-supplied parameters leading to arithmetic overflow during block size calculations in the blocksize filter module. This vulnerability could be leveraged by an attacker to disrupt services relying on nbdkit, potentially impacting storage availability in virtualized or containerized environments.
Potential Impact
For European organizations, the primary impact of CVE-2025-47712 is the potential denial of service on systems utilizing nbdkit for network block device provisioning, particularly those running Red Hat Enterprise Linux 10 with the affected versions. This can disrupt critical storage services, affecting virtual machines, containers, or other infrastructure components dependent on network block devices. Industries with high reliance on virtualized storage, such as finance, telecommunications, cloud service providers, and public sector entities, could experience service interruptions leading to operational downtime and potential financial losses. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could hinder business continuity and incident response capabilities. The lack of known exploits reduces immediate risk, but the ease of triggering the overflow with crafted client requests means attackers with network access could exploit this to cause outages. European organizations with exposed or internal network access to nbdkit services should consider the risk of targeted DoS attacks, especially in environments with limited redundancy or failover mechanisms.
Mitigation Recommendations
To mitigate CVE-2025-47712, organizations should prioritize updating nbdkit to a patched version once available from Red Hat or the nbdkit maintainers. In the absence of an immediate patch, administrators can implement network-level controls to restrict access to nbdkit services only to trusted clients and internal networks, minimizing exposure to untrusted actors. Monitoring and rate-limiting client requests for block status information can help detect and prevent attempts to trigger the overflow. Additionally, deploying application-layer firewalls or intrusion prevention systems capable of recognizing abnormal request patterns targeting nbdkit may reduce exploitation risk. System administrators should audit their environments to identify all instances of nbdkit running affected versions and verify that only authorized users have network access. Implementing redundancy and failover for critical storage services can reduce the operational impact of potential DoS events. Finally, maintaining comprehensive logging and alerting on nbdkit service crashes will facilitate rapid detection and response to exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-47712: Integer Overflow or Wraparound
Description
A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-47712 is an integer overflow or wraparound vulnerability found in the "blocksize" filter of nbdkit, a network block device server used to provide virtual block devices over a network. The vulnerability occurs when a client issues a request for block status information covering a very large data range that exceeds internal limits. This causes an integer overflow or wraparound in the calculation of the data size or block count, leading to an internal error within nbdkit. The result is a denial of service (DoS) condition where the nbdkit process crashes or becomes unresponsive, disrupting access to the virtual block device. The vulnerability affects specific versions of nbdkit (1.21.16, 1.40.0, 1.42.0) running on Red Hat Enterprise Linux 10. Exploitation requires network access and low privileges (PR:L), but no user interaction is needed. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. No known exploits have been reported in the wild as of the publication date. The flaw stems from insufficient validation of client-supplied parameters leading to arithmetic overflow during block size calculations in the blocksize filter module. This vulnerability could be leveraged by an attacker to disrupt services relying on nbdkit, potentially impacting storage availability in virtualized or containerized environments.
Potential Impact
For European organizations, the primary impact of CVE-2025-47712 is the potential denial of service on systems utilizing nbdkit for network block device provisioning, particularly those running Red Hat Enterprise Linux 10 with the affected versions. This can disrupt critical storage services, affecting virtual machines, containers, or other infrastructure components dependent on network block devices. Industries with high reliance on virtualized storage, such as finance, telecommunications, cloud service providers, and public sector entities, could experience service interruptions leading to operational downtime and potential financial losses. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could hinder business continuity and incident response capabilities. The lack of known exploits reduces immediate risk, but the ease of triggering the overflow with crafted client requests means attackers with network access could exploit this to cause outages. European organizations with exposed or internal network access to nbdkit services should consider the risk of targeted DoS attacks, especially in environments with limited redundancy or failover mechanisms.
Mitigation Recommendations
To mitigate CVE-2025-47712, organizations should prioritize updating nbdkit to a patched version once available from Red Hat or the nbdkit maintainers. In the absence of an immediate patch, administrators can implement network-level controls to restrict access to nbdkit services only to trusted clients and internal networks, minimizing exposure to untrusted actors. Monitoring and rate-limiting client requests for block status information can help detect and prevent attempts to trigger the overflow. Additionally, deploying application-layer firewalls or intrusion prevention systems capable of recognizing abnormal request patterns targeting nbdkit may reduce exploitation risk. System administrators should audit their environments to identify all instances of nbdkit running affected versions and verify that only authorized users have network access. Implementing redundancy and failover for critical storage services can reduce the operational impact of potential DoS events. Finally, maintaining comprehensive logging and alerting on nbdkit service crashes will facilitate rapid detection and response to exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-07T21:08:45.449Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6846c60d7b622a9fdf1e7925
Added to database: 6/9/2025, 11:31:25 AM
Last enriched: 11/8/2025, 7:47:43 AM
Last updated: 11/22/2025, 4:42:39 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.