Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60360: n/a

0
Low
VulnerabilityCVE-2025-60360cvecve-2025-60360
Published: Fri Oct 17 2025 (10/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

radare2 v5.9.8 and before contains a memory leak in the function r2r_subprocess_init.

AI-Powered Analysis

AILast updated: 10/17/2025, 14:31:42 UTC

Technical Analysis

CVE-2025-60360 identifies a memory leak vulnerability in radare2, an open-source reverse engineering tool widely used for binary analysis and debugging. The flaw exists in the function r2r_subprocess_init in versions 5.9.8 and earlier. A memory leak occurs when allocated memory is not properly released, causing gradual consumption of system memory over time. Although this vulnerability does not directly allow code execution or privilege escalation, continuous exploitation could exhaust system resources, leading to degraded performance or denial of service (DoS). The absence of a CVSS score and known exploits suggests it is not currently exploited in the wild, but the vulnerability remains a concern for environments where radare2 is heavily used. The lack of patch links indicates that a fix may not yet be publicly available, emphasizing the need for vigilance. Since radare2 is often employed by security researchers and developers, the vulnerability could impact the stability of analysis environments, especially when processing untrusted or malformed binaries. The technical details do not indicate any authentication or user interaction requirements, implying that any user with access to the vulnerable radare2 instance could trigger the leak. However, exploitation requires deliberate invocation of the affected function, limiting the attack surface to users running the tool.

Potential Impact

For European organizations, the primary impact of CVE-2025-60360 is potential resource exhaustion leading to denial of service conditions on systems running vulnerable radare2 versions. This could disrupt software analysis workflows, delay security research, and impact development pipelines relying on reverse engineering. While confidentiality and integrity are not directly compromised, availability degradation can affect operational efficiency and incident response capabilities. Organizations using radare2 in automated or large-scale analysis environments may experience amplified effects due to repeated triggering of the memory leak. The vulnerability could also increase operational costs by requiring more frequent system restarts or memory management interventions. Given radare2's niche but critical role in cybersecurity and software development, the impact is significant within those contexts but limited outside them.

Mitigation Recommendations

To mitigate CVE-2025-60360, organizations should first monitor official radare2 repositories and security advisories for patches addressing the memory leak. Until a patch is available, users should limit the use of vulnerable radare2 versions, especially in automated or high-load environments. Employing resource monitoring tools to detect abnormal memory consumption during radare2 operations can help identify exploitation attempts. Running radare2 with restricted privileges and isolating it within containerized or sandboxed environments can minimize potential impact. Additionally, avoid processing untrusted or malformed binaries that could trigger the leak. Organizations should also consider alternative reverse engineering tools if immediate patching is not feasible. Finally, integrating memory leak detection tools during development and testing phases can prevent similar vulnerabilities in custom tooling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f24fd29c34d0947f2503ea

Added to database: 10/17/2025, 2:16:50 PM

Last enriched: 10/17/2025, 2:31:42 PM

Last updated: 10/19/2025, 9:20:41 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats