Cyber Posture

CVE-2025-46411

HighPublic PoC

Published: 25 August 2025

Published
25 August 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0025 48.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-46411 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Libbiosig Project Libbiosig. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 48.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the buffer overflow vulnerability by requiring timely remediation through patching libbiosig as detailed in the Talos advisory.

prevent

Prevents exploitation by enforcing validation of MFER file inputs to detect and reject malformed structures that trigger the stack buffer overflow.

prevent

Mitigates stack-based buffer overflow exploitation through memory protections like stack canaries, ASLR, and DEP.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Stack buffer overflow in file parser directly enables client-side arbitrary code execution via a malicious MFER file (T1204.002) or exploitation of client software (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to…

more

trigger this vulnerability.

Deeper analysisAI

A stack-based buffer overflow vulnerability, tracked as CVE-2025-46411 and associated with CWE-121, affects the MFER parsing functionality in The Biosig Project's libbiosig version 3.9.0 and the master branch at commit 35a819fa. This flaw allows a specially crafted MFER file to trigger the overflow, potentially leading to arbitrary code execution. The vulnerability received a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H), highlighting its high severity due to network accessibility and significant impacts on confidentiality, integrity, and availability.

An unauthenticated attacker can exploit this vulnerability by providing a malicious MFER file to an application or system that uses the affected libbiosig versions for parsing such files. Exploitation requires high attack complexity but does not necessitate user interaction or privileges. Successful exploitation enables arbitrary code execution with the privileges of the parsing process, potentially allowing full system compromise depending on the context in which libbiosig is deployed.

Details on mitigation, including any patches or workarounds, are provided in the Talos Intelligence advisory TALOS-2025-2236, available at https://talosintelligence.com/vulnerability_reports/TALOS-2025-2236.

Details

CWE(s)

Affected Products

libbiosig project
libbiosig
3.9.0

CVEs Like This One

CVE-2025-54481Same product: Libbiosig Project Libbiosig
CVE-2025-54483Same product: Libbiosig Project Libbiosig
CVE-2025-54480Same product: Libbiosig Project Libbiosig
CVE-2025-54485Same product: Libbiosig Project Libbiosig
CVE-2025-54482Same product: Libbiosig Project Libbiosig
CVE-2025-54493Same product: Libbiosig Project Libbiosig
CVE-2025-54487Same product: Libbiosig Project Libbiosig
CVE-2025-54484Same product: Libbiosig Project Libbiosig
CVE-2025-66048Same product: Libbiosig Project Libbiosig
CVE-2025-54486Same product: Libbiosig Project Libbiosig

References