CVE-2025-47358

Memory · Memory Multiple Products

A high-severity vulnerability has been identified in multiple products from the vendor "Memory." This flaw, identified as CVE-2025-47358, can allow a local attacker to corrupt system memory, leading t.

Executive summary

A high-severity vulnerability has been identified in multiple products from the vendor "Memory." This flaw, identified as CVE-2025-47358, can allow a local attacker to corrupt system memory, leading to a system crash (Denial of Service) or potentially enabling them to gain complete control over the affected system. Organizations are strongly advised to apply the vendor-provided security updates immediately to mitigate the risk of system instability and unauthorized administrative access.

Vulnerability

This vulnerability is a memory corruption flaw that occurs within the mem_free API. An attacker with local user access can craft a request to this API, passing a memory address that has been maliciously modified to point to a location within the protected kernel memory space instead of the user's own memory space. The mem_free function fails to properly validate that the provided address belongs to the calling process, leading it to inadvertently free a critical piece of kernel memory. This action can immediately trigger a system crash (kernel panic) resulting in a Denial of Service, or it could be leveraged by a skilled attacker to achieve arbitrary code execution with kernel-level privileges, leading to a full system compromise.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.8. Exploitation could have a significant negative impact on business operations. Successful exploitation could lead to critical system downtime due to Denial of Service, disrupting business continuity and causing potential financial loss. Furthermore, the potential for privilege escalation means a low-privileged local user could gain complete administrative control of the system, posing a severe risk to data confidentiality, integrity, and availability. An attacker with such access could install malware, exfiltrate sensitive data, or pivot to other systems within the network.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected systems immediately. Organizations should first identify all instances of the vulnerable software and then prioritize patching for critical systems. Following patching, system administrators should monitor for any signs of exploitation attempts by reviewing system crash logs, security alerts, and relevant application access logs for anomalous behavior.

Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should look for unexpected system reboots or kernel panic logs, which could indicate a failed exploitation attempt. Utilize Endpoint Detection and Response (EDR) or Host-based Intrusion Prevention Systems (HIPS) to detect and alert on unusual process behavior, especially processes making anomalous calls to memory management functions.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Restrict interactive login access to affected systems to only trusted administrative users. Implement application control or whitelisting to prevent unauthorized code from being executed by users, as this is a required first step for an attacker to exploit this local vulnerability.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 7.8 and the potential for a full system compromise via privilege escalation, this vulnerability presents a critical risk to the organization. While CVE-2025-47358 is not currently listed on the CISA KEV list, its severity warrants immediate attention. We strongly recommend that all system owners identify affected assets and apply the vendor-supplied patches on an emergency basis to prevent potential system compromise or operational disruption.