CVE-2025-54351

iperf · iperf Multiple Products

A high-severity vulnerability has been discovered in versions of the iperf network performance tool prior to version 3.

Executive summary

A high-severity vulnerability has been discovered in versions of the iperf network performance tool prior to version 3. This flaw could allow an unauthenticated remote attacker to execute arbitrary code on a vulnerable system by sending a specially crafted network packet. Successful exploitation could lead to a complete system compromise, enabling data theft, service disruption, or further attacks on the internal network.

Vulnerability

The vulnerability exists due to a boundary error within the iperf server process when handling incoming client connections. An unauthenticated attacker can send a specially crafted packet to the listening iperf instance, triggering a buffer overflow. This condition can be leveraged by the attacker to overwrite adjacent memory and execute arbitrary code with the same privileges as the iperf service account.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.9, posing a significant risk to the organization. Successful exploitation could grant an attacker a foothold within the network, leading to a complete compromise of the affected server or workstation. Potential consequences include the exfiltration of sensitive data, deployment of ransomware, or the use of the compromised system as a pivot point for lateral movement across the network. Given that iperf is often used on critical servers and network infrastructure for performance testing, its compromise could have a widespread and severe impact on business operations and data security.

Remediation

Immediate Action: All system administrators should immediately identify assets running vulnerable versions of iperf (prior to version 3) and apply the vendor-recommended security updates to upgrade to a patched version. After patching, verify that the update was successful and the service is operating as expected.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes scrutinizing network traffic on iperf's default port (TCP/UDP 5201) for anomalous patterns or malformed packets. Review system and application logs on hosts running iperf for any unexpected crashes, restarts, or suspicious process execution.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Use network or host-based firewalls to restrict access to the iperf service port, allowing connections only from trusted IP addresses required for testing. If possible, run the iperf service with a dedicated, low-privilege user account to limit the impact of a potential compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability represents a critical risk to the organization and must be addressed with urgency. The primary recommendation is to apply the vendor-supplied patches to all affected systems immediately. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high severity and potential for remote code execution make it a prime candidate for future inclusion. Organizations should prioritize patching and implement monitoring and compensating controls without delay to prevent potential compromise.