Plattform
linux
Komponente
iperf
Behoben in
3.19.1
CVE-2025-54351 describes a buffer overflow vulnerability discovered in iperf3, a widely used network performance measurement tool. This flaw allows a remote attacker to potentially execute arbitrary code by exploiting the --skip-rx-copy option. The vulnerability affects versions of iperf3 prior to 3.19.1, and a patch has been released to address the issue.
The buffer overflow vulnerability in iperf3 allows an attacker to craft malicious input that exceeds the allocated buffer size during network performance testing. Successfully exploiting this vulnerability could lead to arbitrary code execution on the target system. This could grant the attacker complete control over the affected machine, enabling them to install malware, steal sensitive data, or disrupt network operations. Given iperf3's use in network benchmarking and performance analysis, this vulnerability poses a significant risk to systems involved in these activities.
CVE-2025-54351 is not currently listed on the CISA KEV catalog. Public proof-of-concept (PoC) exploits are not yet publicly available, but the vulnerability's nature suggests that development of such exploits is likely. The vulnerability was publicly disclosed on 2025-08-03.
Systems administrators and network engineers who utilize iperf3 for network performance testing are at risk. This includes organizations involved in network infrastructure management, software development, and quality assurance, particularly those using older, unpatched versions of iperf3.
• linux / server:
journalctl -u iperf3 -f | grep -i overflow• linux / server:
ps aux | grep iperf3 --skip-rx-copydisclosure
Exploit-Status
EPSS
0.05% (15% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-54351 is to upgrade to iperf3 version 3.19.1 or later. If upgrading is not immediately feasible, consider temporarily disabling the --skip-rx-copy option, as this is the trigger for the vulnerability. Network firewalls and intrusion detection systems (IDS) should be configured to monitor for unusual network traffic patterns associated with iperf3, particularly those involving the --skip-rx-copy flag. After upgrading, confirm the fix by running iperf3 with the --skip-rx-copy flag and verifying that no crashes or unexpected behavior occurs.
Actualice iperf3 a la versión 3.19.1 o superior. Esta versión corrige la vulnerabilidad de desbordamiento de búfer. Puede descargar la nueva versión desde el sitio web oficial o a través del gestor de paquetes de su sistema operativo.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-54351 is a HIGH severity buffer overflow vulnerability in iperf3 versions 0-3.19.0. It allows attackers to potentially execute code by exploiting the --skip-rx-copy option.
You are affected if you are using iperf3 versions 0.0.0 through 3.19.0. Upgrade to version 3.19.1 or later to mitigate the risk.
Upgrade to iperf3 version 3.19.1 or later. As a temporary workaround, disable the --skip-rx-copy option.
While no active exploitation has been confirmed, the vulnerability's nature makes it likely that exploits will be developed. Monitor your systems closely.
Refer to the iperf3 project's official website and security advisories for the latest information regarding CVE-2025-54351.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.