CVE-2025-1744
Published: 28 February 2025
Summary
CVE-2025-1744 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Radare Radare2. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 35.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires identification, reporting, and timely correction of flaws like the heap-based buffer overflow in radare2 versions before 5.9.9 via patching.
Implements memory protections such as non-executable heap and address space randomization to mitigate exploitation of out-of-bounds writes and overflows.
Enables scanning and monitoring to identify deployments of vulnerable radare2 versions affected by CVE-2025-1744 for remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in radare2 enables client-side exploitation via malicious input file or data.
NVD Description
Out-of-bounds Write vulnerability in radareorg radare2 allows heap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9.
Deeper analysisAI
CVE-2025-1744 is an out-of-bounds write vulnerability in radareorg radare2 that allows heap-based buffer over-read or buffer overflow. The issue affects radare2 versions before 5.9.9 and is classified under CWE-787.
With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability can be exploited remotely by an unauthenticated attacker with low complexity and no user interaction. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability, potentially allowing arbitrary heap memory read or write operations.
The vulnerability is addressed via a patch in the GitHub pull request at https://github.com/radareorg/radare2/pull/23969. Affected users should update to radare2 version 5.9.9 or later to mitigate the issue.
Details
- CWE(s)