CVE-2025-0430
Published: 17 January 2025
Summary
CVE-2025-0430 is a high-severity NULL Pointer Dereference (CWE-476) vulnerability in Cisa (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked in the top 19.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires identification, reporting, and correction of flaws like this NULL dereference vulnerability to prevent remote DoS exploitation.
Provides specific protections against denial-of-service events triggered by remote exploitation of the NULL dereference flaw.
Mandates proper error handling to mitigate application crashes from null pointer dereferences caused by malicious network inputs.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
NULL dereference enables remote application crash via exploitation for endpoint DoS.
NVD Description
Belledonne Communications Linphone-Desktop is vulnerable to a NULL Dereference vulnerability, which could allow a remote attacker to create a denial-of-service condition.
Deeper analysisAI
CVE-2025-0430, published on 2025-01-17, is a NULL Dereference vulnerability (CWE-476) in Belledonne Communications Linphone-Desktop. This flaw could allow a remote attacker to create a denial-of-service condition, with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity due to its network accessibility, low attack complexity, and significant availability impact.
A remote attacker requires no privileges or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation results in a denial-of-service condition, potentially crashing the affected Linphone-Desktop application and disrupting service availability without impacting confidentiality or integrity.
Mitigation details are provided in the CISA ICS Advisory ICSA-25-014-04, available at https://www.cisa.gov/news-events/ics-advisories/icsa-25-014-04.
Details
- CWE(s)