Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25087: CWE-416 Use After Free in Apache Software Foundation Apache Arrow

0
High
VulnerabilityCVE-2026-25087cvecve-2026-25087cwe-416
Published: Tue Feb 17 2026 (02/17/2026, 13:18:25 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Arrow

Description

Use After Free vulnerability in Apache Arrow C++. This issue affects Apache Arrow C++ from 15.0.0 through 23.0.0. It can be triggered when reading an Arrow IPC file (but not an IPC stream) with pre-buffering enabled, if the IPC file contains data with variadic buffers (such as Binary View and String View data). Depending on the number of variadic buffers in a record batch column and on the temporal sequence of multi-threaded IO, a write to a dangling pointer could occur. The value (a `std::shared_ptr<Buffer>` object) that is written to the dangling pointer is not under direct control of the attacker. Pre-buffering is disabled by default but can be enabled using a specific C++ API call (`RecordBatchFileReader::PreBufferMetadata`). The functionality is not exposed in language bindings (Python, Ruby, C GLib), so these bindings are not vulnerable. The most likely consequence of this issue would be random crashes or memory corruption when reading specific kinds of IPC files. If the application allows ingesting IPC files from untrusted sources, this could plausibly be exploited for denial of service. Inducing more targeted kinds of misbehavior (such as confidential data extraction from the running process) depends on memory allocation and multi-threaded IO temporal patterns that are unlikely to be easily controlled by an attacker. Advice for users of Arrow C++: 1. check whether you enable pre-buffering on the IPC file reader (using `RecordBatchFileReader::PreBufferMetadata`) 2. if so, either disable pre-buffering (which may have adverse performance consequences), or switch to Arrow 23.0.1 which is not vulnerable

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/25/2026, 00:02:19 UTC

Technical Analysis

CVE-2026-25087 is a Use After Free (CWE-416) vulnerability affecting the Apache Arrow C++ library versions 15.0.0 through 23.0.0. The flaw arises when reading Arrow IPC files (not IPC streams) with pre-buffering enabled via the RecordBatchFileReader::PreBufferMetadata API. Specifically, if the IPC file contains data with variadic buffers—such as Binary View or String View types—the interaction of multiple variadic buffers in a record batch column combined with multi-threaded IO timing can cause a write operation to a dangling pointer. This dangling pointer write involves a std::shared_ptr<Buffer> object, which is not directly attacker-controlled, reducing the likelihood of arbitrary code execution. The vulnerability is limited to the C++ implementation since pre-buffering is not exposed in other language bindings like Python, Ruby, or C GLib, which remain unaffected. The primary consequence is potential random crashes or memory corruption when processing specially crafted IPC files. If an application ingests IPC files from untrusted sources and has pre-buffering enabled, denial of service attacks are plausible. More targeted attacks such as confidential data extraction are theoretically possible but highly improbable due to the complexity of controlling memory allocation and IO timing in multi-threaded environments. The vulnerability was publicly disclosed on February 17, 2026, with no known exploits in the wild. Mitigation involves either disabling pre-buffering or upgrading to Apache Arrow 23.0.1, which contains the fix. The CVSS v3.1 base score is 7.0, indicating a high severity with network attack vector, high attack complexity, no privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability.

Potential Impact

The primary impact of CVE-2026-25087 is denial of service through application crashes or memory corruption when processing maliciously crafted Arrow IPC files with pre-buffering enabled. Organizations using Apache Arrow C++ in data processing pipelines that consume IPC files from untrusted or semi-trusted sources could experience service disruptions, potentially affecting data analytics, real-time processing, or ETL workflows. Although the vulnerability does not readily allow remote code execution or data leakage, the instability caused by memory corruption could lead to broader system reliability issues or cascading failures in dependent services. Since the vulnerability requires enabling a specific pre-buffering feature not enabled by default and is limited to the C++ implementation, the attack surface is somewhat constrained. However, high-value targets relying on Apache Arrow C++ for large-scale data processing, such as cloud service providers, financial institutions, and research organizations, may face operational risks. The lack of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop techniques to exploit the memory corruption more effectively. The vulnerability's network attack vector means remote attackers can trigger it by supplying crafted IPC files, increasing exposure in distributed environments.

Mitigation Recommendations

1. Audit all applications and services using Apache Arrow C++ to determine if pre-buffering is enabled via RecordBatchFileReader::PreBufferMetadata. 2. If pre-buffering is enabled, consider disabling it to eliminate the vulnerability, understanding that this may impact performance. 3. Upgrade Apache Arrow C++ to version 23.0.1 or later, where the vulnerability is patched, to maintain pre-buffering benefits without risk. 4. Implement strict input validation and source verification for IPC files ingested from external or untrusted sources to reduce the risk of malicious file processing. 5. Employ runtime memory protection mechanisms such as AddressSanitizer or similar tools during development and testing to detect use-after-free conditions early. 6. Monitor application logs and crash reports for signs of memory corruption or unexpected terminations related to IPC file processing. 7. Isolate data processing environments handling IPC files from untrusted sources to limit potential denial of service impact. 8. Stay informed on Apache Arrow security advisories and apply patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-01-29T09:18:06.955Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699470fb80d747be20b50365

Added to database: 2/17/2026, 1:45:31 PM

Last enriched: 2/25/2026, 12:02:19 AM

Last updated: 4/3/2026, 7:50:02 PM

Views: 295

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses