Cyber Posture

CVE-2025-69649

HighPublic PoC

Published: 06 March 2026

Published
06 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0004 13.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-69649 is a high-severity NULL Pointer Dereference (CWE-476) vulnerability in Gnu Binutils. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 13.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Null pointer dereference in readelf enables direct application DoS via crafted ELF input (exploitation for endpoint denial of service).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability when processing a crafted ELF binary with malformed header fields. During relocation processing, an invalid or null section pointer may be passed into display_relocations(), resulting in a segmentation fault…

more

(SIGSEGV) and abrupt termination. No evidence of memory corruption beyond the null pointer dereference, nor any possibility of code execution, was observed.

Deeper analysisAI

CVE-2025-69649 is a null pointer dereference vulnerability (CWE-476) in the readelf tool of GNU Binutils versions through 2.46. The flaw arises when processing a crafted ELF binary with malformed header fields, where an invalid or null section pointer is passed to the display_relocations() function during relocation processing. This triggers a segmentation fault (SIGSEGV), causing abrupt termination of the readelf process. Published on 2026-03-06, the vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), with no observed memory corruption beyond the dereference or potential for code execution.

Any remote attacker can exploit this vulnerability without privileges or user interaction by providing a specially crafted ELF binary to the readelf tool. Successful exploitation results in a denial-of-service condition, crashing the readelf process and disrupting analysis workflows for users or automated systems relying on it, such as build pipelines or debugging tools.

The issue is tracked in the Sourceware Bugzilla report at https://sourceware.org/bugzilla/show_bug.cgi?id=33697, with a fix available in the upstream commit at https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=66a3492ce68e1ae45b2489bd9a815c39ea5d7f66. Security practitioners should update GNU Binutils to a version incorporating this patch and validate ELF inputs when using readelf in untrusted environments.

Details

CWE(s)

Affected Products

gnu
binutils
≤ 2.46

CVEs Like This One

CVE-2025-69650Same product: Gnu Binutils
CVE-2025-1179Same product: Gnu Binutils
CVE-2025-0840Same product: Gnu Binutils
CVE-2026-1584Same vendor: Gnu
CVE-2025-13151Same vendor: Gnu
CVE-2026-4046Same vendor: Gnu
CVE-2025-15281Same vendor: Gnu
CVE-2026-4437Same vendor: Gnu
CVE-2026-4652Shared CWE-476
CVE-2026-33282Shared CWE-476

References