Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8090: CWE-476 NULL Pointer Dereference in BlackBerry Ltd QNX Software Development Platform

0
Medium
VulnerabilityCVE-2025-8090cvecve-2025-8090cwe-476
Published: Tue Jan 13 2026 (01/13/2026, 16:36:21 UTC)
Source: CVE Database V5
Vendor/Project: BlackBerry Ltd
Product: QNX Software Development Platform

Description

CVE-2025-8090 is a medium severity vulnerability in BlackBerry's QNX Software Development Platform versions 7. 0 and 7. 1. It involves a NULL pointer dereference in the MsgRegisterEvent() system call, which can be triggered by an attacker with local access and code execution privileges to crash the QNX Neutrino kernel. This results in a denial of service condition without impacting confidentiality or integrity. Exploitation requires local access but no user interaction or elevated privileges beyond code execution. There are currently no known exploits in the wild and no patches publicly available. The vulnerability primarily affects embedded systems running QNX, commonly used in automotive, industrial, and critical infrastructure sectors. European organizations relying on QNX-based systems could face operational disruptions if exploited. Mitigation involves restricting local access, monitoring for abnormal kernel crashes, and applying vendor patches once released.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:53:31 UTC

Technical Analysis

CVE-2025-8090 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting BlackBerry Ltd's QNX Software Development Platform versions 7.0 and 7.1. The flaw exists in the MsgRegisterEvent() system call within the QNX Neutrino kernel, where improper handling of a NULL pointer can lead to a kernel crash. An attacker with local access and the ability to execute code on the system can exploit this vulnerability to cause a denial of service by crashing the kernel, resulting in system instability or downtime. The vulnerability does not allow for privilege escalation, data leakage, or code execution beyond the initial access, as it only impacts availability. The CVSS v3.1 base score is 6.2, reflecting medium severity, with attack vector Local, low attack complexity, no privileges required beyond code execution, no user interaction, and impact limited to availability. QNX is widely used in embedded systems, including automotive infotainment, industrial control systems, and critical infrastructure devices, making this vulnerability relevant to sectors relying on such platforms. No public exploits or patches are currently available, but the vulnerability has been officially published and reserved by BlackBerry. The lack of patches necessitates proactive mitigation to prevent potential denial of service attacks.

Potential Impact

The primary impact of CVE-2025-8090 is denial of service through kernel crashes on systems running vulnerable QNX versions. For European organizations, this can disrupt operations in sectors heavily reliant on QNX embedded systems, such as automotive manufacturing, industrial automation, and critical infrastructure management. Automotive manufacturers using QNX for infotainment or vehicle control systems could experience system reboots or failures, potentially affecting production lines or vehicle safety features. Industrial control systems in utilities or manufacturing plants may face operational interruptions, leading to financial losses and safety risks. Although the vulnerability does not compromise confidentiality or integrity, availability disruptions in critical systems can have cascading effects on business continuity and safety compliance. The requirement for local access and code execution limits remote exploitation but insider threats or compromised local devices could leverage this flaw. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Restrict local access to systems running QNX to trusted personnel only, employing strict access controls and monitoring. 2. Implement robust endpoint security measures to prevent unauthorized code execution on QNX devices, including application whitelisting and behavioral monitoring. 3. Monitor system logs and kernel crash reports for signs of abnormal MsgRegisterEvent() failures or unexpected reboots indicative of exploitation attempts. 4. Isolate QNX-based embedded systems from general-purpose networks to reduce attack surface and lateral movement opportunities. 5. Engage with BlackBerry for timely updates and patches; apply security patches promptly once available. 6. Conduct regular security audits and penetration tests focusing on local access vectors to identify potential exploitation paths. 7. Develop incident response plans specific to embedded system denial of service scenarios to minimize downtime impact. 8. Consider deploying redundancy and failover mechanisms in critical QNX-dependent systems to maintain availability during incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
blackberry
Date Reserved
2025-07-23T15:38:00.519Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69667941a60475309f8fa6c5

Added to database: 1/13/2026, 4:56:33 PM

Last enriched: 1/21/2026, 2:53:31 AM

Last updated: 2/7/2026, 4:55:39 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats