Cyber Posture

CVE-2025-25066

High

Published: 03 February 2025

Published
03 February 2025
Modified
02 October 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0006 18.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25066 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Ntop Ndpi. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 18.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely remediation by patching the stack-based buffer overflow in nDPI's ndpi_address_cache_restore function.

prevent

Provides memory protections like stack canaries that detect and block exploitation of the stack buffer overflow even if unpatched.

detect

Requires vulnerability scanning to identify deployments of vulnerable nDPI versions affected by CVE-2025-25066.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local stack-based buffer overflow enabling arbitrary code execution with no privileges required directly maps to exploitation for privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

nDPI through 4.12 has a potential stack-based buffer overflow in ndpi_address_cache_restore in lib/ndpi_cache.c.

Deeper analysisAI

CVE-2025-25066, published on 2025-02-03, is a potential stack-based buffer overflow vulnerability (CWE-121) in the ndpi_address_cache_restore function located in lib/ndpi_cache.c of nDPI through version 4.12. This flaw carries a CVSS v3.1 base score of 8.1 (AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to its potential for significant impact across confidentiality, integrity, and availability with a changed scope.

The vulnerability can be exploited by a local attacker requiring no privileges (PR:N), though it demands high attack complexity (AC:H) and no user interaction (UI:N). With local access vector (AV:L), a successful exploit could grant the attacker high-level control, potentially enabling arbitrary code execution, data corruption, or system crashes, while the changed scope (S:C) allows impacts beyond the vulnerable component.

Mitigation is addressed in a patch via the GitHub commit at https://github.com/ntop/nDPI/commit/678697b5eb6c3caa5dd5f8cccfe9eed8d13b94bb. Security practitioners should apply this fix by updating nDPI to a patched version to prevent exploitation.

Details

CWE(s)

Affected Products

ntop
ndpi
≤ 4.12

CVEs Like This One

CVE-2025-70616Shared CWE-121
CVE-2026-39457Shared CWE-121
CVE-2026-24882Shared CWE-121
CVE-2026-21224Shared CWE-121
CVE-2025-47391Shared CWE-121
CVE-2025-24928Shared CWE-121
CVE-2025-70083Shared CWE-121
CVE-2026-32708Shared CWE-121
CVE-2026-23995Shared CWE-121
CVE-2025-26506Shared CWE-121

References