CVE-2025-25066
Published: 03 February 2025
Summary
CVE-2025-25066 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Ntop Ndpi. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 18.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely remediation by patching the stack-based buffer overflow in nDPI's ndpi_address_cache_restore function.
Provides memory protections like stack canaries that detect and block exploitation of the stack buffer overflow even if unpatched.
Requires vulnerability scanning to identify deployments of vulnerable nDPI versions affected by CVE-2025-25066.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local stack-based buffer overflow enabling arbitrary code execution with no privileges required directly maps to exploitation for privilege escalation.
NVD Description
nDPI through 4.12 has a potential stack-based buffer overflow in ndpi_address_cache_restore in lib/ndpi_cache.c.
Deeper analysisAI
CVE-2025-25066, published on 2025-02-03, is a potential stack-based buffer overflow vulnerability (CWE-121) in the ndpi_address_cache_restore function located in lib/ndpi_cache.c of nDPI through version 4.12. This flaw carries a CVSS v3.1 base score of 8.1 (AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to its potential for significant impact across confidentiality, integrity, and availability with a changed scope.
The vulnerability can be exploited by a local attacker requiring no privileges (PR:N), though it demands high attack complexity (AC:H) and no user interaction (UI:N). With local access vector (AV:L), a successful exploit could grant the attacker high-level control, potentially enabling arbitrary code execution, data corruption, or system crashes, while the changed scope (S:C) allows impacts beyond the vulnerable component.
Mitigation is addressed in a patch via the GitHub commit at https://github.com/ntop/nDPI/commit/678697b5eb6c3caa5dd5f8cccfe9eed8d13b94bb. Security practitioners should apply this fix by updating nDPI to a patched version to prevent exploitation.
Details
- CWE(s)