Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60361: n/a

0
Low
VulnerabilityCVE-2025-60361cvecve-2025-60361
Published: Fri Oct 17 2025 (10/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

radare2 v5.9.8 and before contains a memory leak in the function bochs_open.

AI-Powered Analysis

AILast updated: 10/24/2025, 18:17:05 UTC

Technical Analysis

CVE-2025-60361 identifies a memory leak vulnerability in radare2, an open-source reverse engineering framework widely used for binary analysis and debugging. The flaw exists in the bochs_open function, which likely handles opening or interfacing with Bochs virtual machine disk images or related components. A memory leak occurs when allocated memory is not properly freed, causing the application’s memory usage to grow unnecessarily over time. While this does not directly compromise confidentiality or integrity, it can lead to degraded system performance or denial of service if the application consumes excessive memory. The vulnerability requires local access with low privileges (AV:L, PR:L), does not require user interaction (UI:N), and affects availability (A:L) only. The CVSS score of 3.3 reflects the limited impact and exploitation complexity. No known exploits have been reported, and no patches have been released at the time of publication. The vulnerability is classified under CWE-401, indicating improper release of memory. Organizations using radare2 in their security research, malware analysis, or software debugging workflows should be aware of this issue and monitor for updates from the radare2 project.

Potential Impact

For European organizations, the primary impact of this vulnerability is potential degradation of availability in systems running vulnerable versions of radare2. Memory leaks can cause increased memory consumption, leading to application crashes or system instability, especially in environments where radare2 is used extensively or in automated pipelines. While the vulnerability does not expose sensitive data or allow unauthorized code execution, it can disrupt security analysis workflows or delay incident response activities. Organizations relying on radare2 for malware analysis, reverse engineering, or forensic investigations may experience reduced operational efficiency. The impact is mitigated by the requirement for local access and the low severity rating. However, in high-security environments or critical infrastructure sectors where radare2 is part of the toolchain, even minor availability issues can have cascading effects.

Mitigation Recommendations

1. Monitor radare2 project communications and repositories for official patches addressing CVE-2025-60361 and apply updates promptly once available. 2. Restrict local access to systems running radare2 to trusted users only, minimizing the risk of exploitation by unauthorized personnel. 3. Implement resource monitoring tools to track memory usage of radare2 processes, enabling early detection of abnormal consumption patterns indicative of the memory leak. 4. Consider running radare2 in isolated or containerized environments to limit the impact of potential memory exhaustion on host systems. 5. For automated analysis pipelines, schedule periodic restarts of radare2 processes to clear accumulated memory usage until a patch is applied. 6. Educate security analysts and developers about this vulnerability to ensure awareness and encourage reporting of any unusual application behavior. 7. Evaluate alternative reverse engineering tools temporarily if the memory leak significantly impacts operational stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f256d89c34d0947f29326d

Added to database: 10/17/2025, 2:46:48 PM

Last enriched: 10/24/2025, 6:17:05 PM

Last updated: 12/4/2025, 12:10:22 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats