Skip to main content

CVE-2025-48756: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in maboroshinokiseki scsir

Low
VulnerabilityCVE-2025-48756cvecve-2025-48756cwe-843
Published: Sat May 24 2025 (05/24/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: maboroshinokiseki
Product: scsir

Description

In group_number in the scsir crate 0.2.0 for Rust, there can be an overflow because a hardware device may expect a small number of bits (e.g., 5 bits) for group number.

AI-Powered Analysis

AILast updated: 07/08/2025, 20:41:19 UTC

Technical Analysis

CVE-2025-48756 is a vulnerability classified under CWE-843 (Access of Resource Using Incompatible Type, also known as 'Type Confusion') found in the scsir crate version 0.2.0 for the Rust programming language. The issue arises in the handling of the 'group_number' parameter within the crate. Specifically, the vulnerability is due to an overflow condition caused by a mismatch between the expected bit-width of the group number by the hardware device (for example, expecting only 5 bits) and the actual data type or size used in the software. This type confusion can lead to an overflow when the software provides a group number value that exceeds the hardware's expected bit size. The scsir crate is a Rust library that likely interfaces with SCSI (Small Computer System Interface) devices or emulates SCSI command interactions. The overflow itself does not directly compromise confidentiality or integrity but can cause a loss of availability, such as a denial of service or crash of the application or device driver using this crate. The CVSS v3.1 score is 2.9 (low severity), reflecting that the attack vector is local (AV:L), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts only availability (A:L) without affecting confidentiality or integrity. No known exploits are reported in the wild, and no patches are currently linked. This vulnerability is primarily a robustness issue in the handling of hardware parameters, which could lead to application instability or device malfunction when processing crafted inputs or commands involving group numbers exceeding the hardware's expected bit size.

Potential Impact

For European organizations, the impact of CVE-2025-48756 is generally limited due to its low severity and local attack vector. However, organizations that develop, maintain, or deploy software or systems using the scsir crate version 0.2.0, particularly in environments interfacing directly with SCSI hardware devices, could experience service disruptions or device malfunctions. This could affect sectors relying on specialized hardware storage or embedded systems using Rust-based SCSI interfaces, such as data centers, telecommunications, or industrial control systems. The overflow could cause denial of service conditions, leading to temporary unavailability of critical hardware or software components. While the vulnerability does not allow for privilege escalation or data breaches, the resulting instability could impact operational continuity. European organizations with strict uptime requirements or those operating critical infrastructure should be aware of this vulnerability to avoid unexpected outages. Given the high attack complexity and local access requirement, exploitation risk is low unless an attacker already has local access to the affected system.

Mitigation Recommendations

To mitigate CVE-2025-48756, European organizations should: 1) Audit their software dependencies to identify usage of the scsir crate version 0.2.0 and assess whether it is used in production or critical environments. 2) Where possible, upgrade to a newer version of the scsir crate if available, or apply patches once released by the vendor or maintainers addressing the overflow issue. 3) Implement strict input validation and bounds checking on group number values before passing them to the scsir crate to ensure they do not exceed the hardware-expected bit size (e.g., mask or limit to 5 bits). 4) Restrict local access to systems running vulnerable versions to trusted users only, minimizing the risk of local exploitation. 5) Monitor system logs and hardware device behavior for signs of crashes or malfunctions that could indicate attempts to trigger the overflow. 6) Engage with hardware and software vendors to confirm compatibility and robustness of SCSI interfaces against malformed inputs. These steps go beyond generic advice by focusing on dependency management, input validation tailored to hardware expectations, and access control to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-24T00:00:00.000Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6831346e0acd01a249277b58

Added to database: 5/24/2025, 2:52:30 AM

Last enriched: 7/8/2025, 8:41:19 PM

Last updated: 7/30/2025, 4:09:37 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats