Cyber Posture

CVE-2025-14769

High

Published: 09 March 2026

Published
09 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0001 1.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-14769 is a high-severity NULL Pointer Dereference (CWE-476) vulnerability in Freebsd Freebsd. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 1.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Remote packet-based NULL dereference enables exploitation of public-facing firewall (T1190) resulting in system crash via application/system exploitation (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer…

more

dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.

Deeper analysisAI

CVE-2025-14769 is a NULL pointer dereference vulnerability (CWE-476) in the ipfw firewall component of FreeBSD. In affected versions, the tcp-setmss handler may free packet data and throw an error without halting the rule processing engine. A subsequent rule can then process and allow the traffic despite the packet data being gone, triggering the dereference. The vulnerability was published on 2026-03-09 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

A remote, unauthenticated attacker can exploit this by sending maliciously crafted packets to a targeted FreeBSD system configured with ipfw rules that include the tcp-setmss directive followed by a rule allowing the traffic. Successful exploitation results in a Denial of Service (DoS) condition due to the crash from the NULL pointer dereference.

The FreeBSD Security Advisory FreeBSD-SA-25:11.ipfw provides details on the issue and mitigation, available at https://security.freebsd.org/advisories/FreeBSD-SA-25:11.ipfw.asc.

Details

CWE(s)

Affected Products

freebsd
freebsd
13.5, 14.3

CVEs Like This One

CVE-2026-4652Same product: Freebsd Freebsd
CVE-2026-7164Same product: Freebsd Freebsd
CVE-2026-4247Same product: Freebsd Freebsd
CVE-2026-3038Same product: Freebsd Freebsd
CVE-2026-35547Same product: Freebsd Freebsd
CVE-2025-14558Same product: Freebsd Freebsd
CVE-2025-15576Same product: Freebsd Freebsd
CVE-2026-2261Same product: Freebsd Freebsd
CVE-2026-42512Same product: Freebsd Freebsd
CVE-2026-7270Same product: Freebsd Freebsd

References