Cyber Posture

CVE-2025-7208

MediumPublic PoC

Published: 09 July 2025

Published
09 July 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0059 69.2th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-7208 is a medium-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in 9Fans Plan9Port. Its CVSS base score is 5.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 30.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-119

Ongoing control assessments and code testing (static/dynamic analysis, fuzzing) surface memory buffer restriction failures, which are then remediated before release.

addresses: CWE-119

Managed runtimes used by platform-independent applications (e.g., JVM, CLR) enforce memory safety, preventing most buffer overflows that require direct memory manipulation.

addresses: CWE-119

Memory protections (e.g., W^X, ASLR) make exploitation of buffer-boundary violations far harder to turn into code execution.

addresses: CWE-119

Detects exploitation attempts that produce memory corruption, crashes, or anomalous behavior.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Heap buffer overflow in X.509 parsing code enables local/adjacent code execution for privilege escalation.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was found in 9fans plan9port up to 9da5b44. It has been classified as critical. This affects the function edump in the library /src/plan9port/src/libsec/port/x509.c. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public…

more

and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is b3e06559475b0130a7a2fb56ac4d131d13d2012f. It is recommended to apply a patch to fix this issue.

Deeper analysisAI

CVE-2025-7208 is a critical heap-based buffer overflow vulnerability in 9fans plan9port up to commit 9da5b44, affecting the edump function in the library /src/plan9port/src/libsec/port/x509.c. Published on 2025-07-09, it is associated with CWEs-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-122 (Heap-based Buffer Overflow), earning a CVSS v3.1 base score of 5.5.

An attacker with adjacent network access (AV:A) and low privileges (PR:L) can exploit this issue with low attack complexity (AC:L) and no user interaction (UI:N), resulting in low impacts to confidentiality, integrity, and availability (C:I:A:L/L/L) in the unchanged security scope (S:U). The manipulation triggers the buffer overflow, and a public exploit has been disclosed.

Due to the product's rolling release model, specific affected and fixed version details are unavailable, but the patch identifier b3e06559475b0130a7a2fb56ac4d131d13d2012f addresses the issue. Security practitioners are advised to apply this patch, with details available in references such as the 9front git commit and the 9fans/plan9port GitHub issue #710.

Details

CWE(s)

Affected Products

9fans
plan9port
≤ 2025-03-29

CVEs Like This One

CVE-2026-3147Shared CWE-119, CWE-122
CVE-2025-1788Shared CWE-119, CWE-122
CVE-2026-25205Shared CWE-122
CVE-2025-54910Shared CWE-122
CVE-2026-20840Shared CWE-122
CVE-2026-3145Shared CWE-119
CVE-2026-20700Shared CWE-119
CVE-2026-20864Shared CWE-122
CVE-2026-20922Shared CWE-122
CVE-2025-24995Shared CWE-122

References