Skip to main content

CVE-2025-48754: CWE-369 Divide By Zero in FractalFir memory_pages

Low
VulnerabilityCVE-2025-48754cvecve-2025-48754cwe-369
Published: Sat May 24 2025 (05/24/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: FractalFir
Product: memory_pages

Description

In the memory_pages crate 0.1.0 for Rust, division by zero can occur.

AI-Powered Analysis

AILast updated: 07/08/2025, 20:40:49 UTC

Technical Analysis

CVE-2025-48754 is a vulnerability identified in version 0.1.0 of the memory_pages crate, a Rust library developed by FractalFir. The issue is classified under CWE-369, which corresponds to a divide-by-zero error. Specifically, the vulnerability arises when the code performs a division operation without validating the divisor, potentially leading to a division by zero. This can cause the affected application to crash or behave unpredictably, resulting in a denial of service (DoS) condition. The vulnerability has a CVSS v3.1 base score of 2.9, indicating a low severity level. The vector string (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) shows that the attack vector is local (AV:L), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts only availability (A:L) without affecting confidentiality or integrity. There are no known exploits in the wild, and no patches have been published yet. The vulnerability is limited to the initial release version 0.1.0 of the memory_pages crate, which is used in Rust-based applications that manage memory page operations. The divide-by-zero error could be triggered by malformed or unexpected input parameters passed to the library functions, causing the application to terminate unexpectedly or enter an unstable state. While this does not directly lead to data leakage or code execution, the availability impact could disrupt services relying on this crate.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to service availability. Applications using the vulnerable memory_pages crate could experience crashes or interruptions if the divide-by-zero condition is triggered. This could affect internal tools, backend services, or any Rust-based applications that depend on this library for memory management. Although the severity is low, critical systems with high availability requirements could face operational disruptions. The lack of confidentiality or integrity impact reduces the risk of data breaches or unauthorized modifications. However, organizations in sectors such as finance, healthcare, or critical infrastructure that rely on Rust applications might see degraded service quality or downtime. Since exploitation requires local access and high attack complexity, remote attackers are unlikely to exploit this vulnerability directly. Nonetheless, insider threats or compromised local accounts could potentially trigger the fault. The absence of user interaction and privileges required simplifies exploitation in trusted environments but limits the scope to local attackers.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify any usage of the memory_pages crate version 0.1.0 within their Rust applications. Developers should audit code paths that interact with this crate to ensure input validation is robust and that division operations are protected against zero divisors. Until an official patch is released, organizations can implement defensive programming techniques such as pre-checking divisor values before division or wrapping calls to the crate in error-handling constructs to gracefully manage potential panics. Additionally, restricting local access to trusted users and enforcing strict access controls can reduce the risk of exploitation. Monitoring application logs for crashes or abnormal terminations related to memory_pages usage can help detect attempted exploitation. Organizations should also track updates from the vendor or Rust community for patches or newer crate versions addressing this issue and plan timely upgrades once available. Incorporating fuzz testing and static analysis tools focused on arithmetic operations can proactively identify similar vulnerabilities in Rust codebases.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-24T00:00:00.000Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6831346e0acd01a249277b54

Added to database: 5/24/2025, 2:52:30 AM

Last enriched: 7/8/2025, 8:40:49 PM

Last updated: 8/16/2025, 5:49:52 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats