Skip to main content

CVE-2025-47868: CWE-787 Out-of-bounds Write in Apache Software Foundation Apache NuttX RTOS: tools/bdf-converter.

Critical
VulnerabilityCVE-2025-47868cvecve-2025-47868cwe-787cwe-122
Published: Mon Jun 16 2025 (06/16/2025, 11:00:05 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache NuttX RTOS: tools/bdf-converter.

Description

Out-of-bounds Write resulting in possible Heap-based Buffer Overflow vulnerability was discovered in tools/bdf-converter font conversion utility that is part of Apache NuttX RTOS repository. This standalone program is optional and neither part of NuttX RTOS nor Applications runtime, but active bdf-converter users may be affected when this tool is exposed to external provided user data data (i.e. publicly available automation). This issue affects Apache NuttX: from 6.9 before 12.9.0. Users are recommended to upgrade to version 12.9.0, which fixes the issue.

AI-Powered Analysis

AILast updated: 06/16/2025, 11:13:21 UTC

Technical Analysis

CVE-2025-47868 is a security vulnerability identified in the Apache NuttX Real-Time Operating System (RTOS), specifically within the tools/bdf-converter utility. This utility is a standalone font conversion tool used to process BDF (Bitmap Distribution Format) font files. The vulnerability is classified as an out-of-bounds write (CWE-787), which can lead to a heap-based buffer overflow (CWE-122). This occurs when the bdf-converter processes external user-supplied data without adequate bounds checking, allowing it to write data beyond the allocated memory buffer. Although the bdf-converter is not part of the core NuttX RTOS or its runtime applications, users who actively employ this tool—especially in automated or publicly exposed environments—may be at risk. The affected versions of Apache NuttX range from 6.9 up to but not including 12.9.0, with the vulnerability fixed in version 12.9.0. No known exploits are currently reported in the wild, and no CVSS score has been assigned to this vulnerability yet. The risk arises primarily when untrusted input is processed by the bdf-converter, potentially allowing an attacker to corrupt memory, which could lead to arbitrary code execution, denial of service, or system instability depending on the context of use.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the deployment and usage of Apache NuttX RTOS and specifically the bdf-converter tool. NuttX is commonly used in embedded systems, IoT devices, and real-time applications such as industrial control, automotive systems, and aerospace. If organizations use the bdf-converter in automated pipelines or expose it to untrusted input (e.g., through public APIs or shared environments), attackers could exploit this vulnerability to execute arbitrary code or cause denial of service. This could compromise the confidentiality, integrity, and availability of critical embedded systems, potentially disrupting industrial operations or safety-critical functions. Since the bdf-converter is optional and not part of the runtime, the attack surface is limited to environments where this tool is actively used. However, given the increasing reliance on embedded systems in sectors like manufacturing, transportation, and energy within Europe, the vulnerability could have significant operational and safety implications if exploited.

Mitigation Recommendations

European organizations using Apache NuttX RTOS should immediately upgrade to version 12.9.0 or later, where this vulnerability is patched. For environments where upgrading is not immediately feasible, organizations should restrict access to the bdf-converter tool, ensuring it is not exposed to untrusted or external input sources. Implement strict input validation and sanitization on any data processed by the bdf-converter to prevent malformed or malicious font files from triggering the vulnerability. Additionally, isolate the execution environment of the bdf-converter using containerization or sandboxing techniques to limit the impact of potential exploitation. Monitoring and logging usage of the bdf-converter can help detect anomalous activity. Finally, review and audit automated workflows that incorporate the bdf-converter to ensure they do not process untrusted data without proper controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-05-12T19:31:40.456Z
Cvss Version
null
State
PUBLISHED

Threat ID: 684ffa37a8c9212743840243

Added to database: 6/16/2025, 11:04:23 AM

Last enriched: 6/16/2025, 11:13:21 AM

Last updated: 7/30/2025, 4:17:56 PM

Views: 27

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats