Cyber Posture

CVE-2025-24975

HighPublic PoC

Published: 15 August 2025

Published
15 August 2025
Modified
09 October 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
EPSS Score 0.0011 29.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24975 is a high-severity Improper Check for Unusual or Exceptional Conditions (CWE-754) vulnerability in Firebirdsql Firebird. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-754

Requires detection and response to audit logging failures as an unusual or exceptional condition.

addresses: CWE-754

Implements detection of unusual or exceptional conditions followed by safe mode entry, reducing the window for exploitation of unchecked conditions.

addresses: CWE-754

Training ensures users perform required checks for unusual or exceptional conditions as part of contingency roles, limiting attacker leverage from skipped validations.

addresses: CWE-754

IR testing directly validates checks for unusual or exceptional conditions that could indicate security incidents.

addresses: CWE-754

Requires ongoing monitoring of organization-defined metrics and analysis, enabling checks for unusual or exceptional conditions.

addresses: CWE-754

Security testing routinely checks for unusual or exceptional inputs/conditions, identifying missing validation steps that flaw remediation then resolves.

addresses: CWE-754

Requires detection of unusual conditions followed by a controlled transition to the defined failure state.

addresses: CWE-754

MTTF determination forces explicit checks for conditions that precede predictable component failure.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote network exploit of public-facing DB server enabling unauthorized encrypted data access and segfault DoS due to improper condition checks in connection pooling.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Firebird is a relational database. Prior to snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609, Firebird is vulnerable if ExtConnPoolSize is not set equal to 0. If connections stored in ExtConnPool are not verified for presence and suitability of the CryptCallback interface…

more

is used when created versus what is available could result in a segfault in the server process. Encrypted databases, accessed by execute statement on external, may be accessed later by an attachment missing a key to that database. In a case when execute statement are chained, segfault may happen. Additionally, the segfault may affect unencrypted databases. This issue has been patched in snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609 and point releases 4.0.6 and 5.0.2. A workaround for this issue involves setting ExtConnPoolSize equal to 0 in firebird.conf.

Deeper analysisAI

CVE-2025-24975 is a vulnerability in Firebird, an open-source relational database server, affecting versions prior to snapshot builds 4.0.6.3183, 5.0.2.1610, and 6.0.0.609 when the ExtConnPoolSize configuration parameter is not set to 0. The issue stems from external connection pool (ExtConnPool) entries not being verified for the presence and suitability of the CryptCallback interface relative to conditions at creation time. This mismatch can trigger a segmentation fault (segfault) in the server process, particularly during chained execute statements on external connections. Encrypted databases accessed via such statements may subsequently be reachable by attachments lacking the encryption key, enabling unauthorized access, while the segfault can also impact unencrypted databases. The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L) and maps to CWE-754 (Improper Check for Unusual or Exceptional Conditions).

A low-privileged user (PR:L) with network access can exploit this over the network (AV:N), though it requires high attack complexity (AC:H) and no user interaction. By issuing execute statements on external connections in a configuration where ExtConnPoolSize exceeds 0, the attacker can induce a server segfault for denial-of-service impact (A:L). Attackers may also gain high confidentiality (C:H) and integrity (I:H) effects by accessing encrypted database contents without the required key via pooled connections reused by unauthorized attachments.

Firebird has patched the vulnerability in snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609, as well as point releases 4.0.6 and 5.0.2. A recommended workaround is to set ExtConnPoolSize to 0 in the firebird.conf file. Official advisories, including the fixing commit, issue discussion, and GitHub security advisory, provide further details on the patch and verification steps.

Details

CWE(s)

Affected Products

firebirdsql
firebird
4.0.0 — 4.0.6 · 5.0.0 — 5.0.2

CVEs Like This One

CVE-2026-33337Same product: Firebirdsql Firebird
CVE-2026-40342Same product: Firebirdsql Firebird
CVE-2026-34232Same product: Firebirdsql Firebird
CVE-2026-28212Same product: Firebirdsql Firebird
CVE-2026-35215Same product: Firebirdsql Firebird
CVE-2026-27890Same product: Firebirdsql Firebird
CVE-2025-65104Same product: Firebirdsql Firebird
CVE-2026-28224Same product: Firebirdsql Firebird
CVE-2026-24054Shared CWE-754
CVE-2026-31790Shared CWE-754

References