Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66216: CWE-131: Incorrect Calculation of Buffer Size in jvde-github AIS-catcher

0
Critical
VulnerabilityCVE-2025-66216cvecve-2025-66216cwe-131
Published: Sat Nov 29 2025 (11/29/2025, 01:57:55 UTC)
Source: CVE Database V5
Vendor/Project: jvde-github
Product: AIS-catcher

Description

AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, a heap buffer overflow vulnerability has been identified in the AIS::Message class of AIS-catcher. This vulnerability allows an attacker to write approximately 1KB of arbitrary data into a 128-byte buffer. This issue has been patched in version 0.64.

AI-Powered Analysis

AILast updated: 12/06/2025, 04:34:03 UTC

Technical Analysis

CVE-2025-66216 is a heap buffer overflow vulnerability identified in the AIS-catcher software, a multi-platform AIS (Automatic Identification System) receiver used for maritime vessel tracking. The vulnerability resides in the AIS::Message class, where an incorrect calculation of buffer size (CWE-131) allows an attacker to write approximately 1KB of arbitrary data into a buffer that is only 128 bytes in size. This discrepancy leads to a heap overflow condition that can corrupt adjacent memory, potentially enabling remote attackers to execute arbitrary code, cause denial of service, or crash the application. The vulnerability is exploitable remotely without requiring authentication or user interaction, increasing its risk profile. AIS-catcher versions prior to 0.64 are affected, and the issue was patched in version 0.64. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). No known exploits are currently reported in the wild, but the critical severity score of 9.3 highlights the urgency of remediation. The vulnerability's root cause is improper buffer size calculation leading to heap overflow, a common and dangerous memory safety flaw.

Potential Impact

For European organizations, this vulnerability poses a significant threat to maritime infrastructure, including port authorities, shipping companies, and maritime security agencies that rely on AIS-catcher for vessel tracking and situational awareness. Exploitation could lead to unauthorized code execution on systems processing AIS data, potentially disrupting maritime traffic monitoring, compromising sensitive operational data, or enabling attackers to pivot into broader network environments. The impact extends to safety-critical maritime operations and national security, given the strategic importance of maritime logistics in Europe. Disruption or manipulation of AIS data could also affect regulatory compliance and incident response capabilities. The vulnerability's remote exploitability and lack of required authentication increase the risk of widespread attacks if unpatched systems are exposed to the internet or untrusted networks.

Mitigation Recommendations

1. Immediately upgrade AIS-catcher to version 0.64 or later, where the vulnerability is patched. 2. Implement network segmentation and restrict AIS-catcher system access to trusted networks only, minimizing exposure to untrusted sources. 3. Employ application-layer firewalls or intrusion detection systems to monitor and block anomalous AIS message traffic that could exploit buffer overflow conditions. 4. Conduct thorough input validation and sanitization on AIS message data before processing to prevent malformed inputs from triggering memory corruption. 5. Regularly audit and update maritime operational software to ensure timely application of security patches. 6. Establish incident response procedures specific to maritime system compromises to quickly detect and mitigate exploitation attempts. 7. Engage with AIS-catcher developers or community to stay informed about any emerging exploit techniques or additional patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.678Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692a5c732a13ea799fd8c85e

Added to database: 11/29/2025, 2:37:39 AM

Last enriched: 12/6/2025, 4:34:03 AM

Last updated: 1/13/2026, 12:59:23 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats