Cyber Posture

CVE-2019-25327

CriticalPublic PoC

Published: 12 February 2026

Published
12 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0026 49.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Prime95 version 29.8 build 6 contains a buffer overflow vulnerability in the user ID input field that allows remote attackers to execute arbitrary code. Attackers can craft a malicious payload and paste it into the PrimeNet user ID and proxy…

more

host fields to trigger a bind shell on port 3110.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of inputs to the PrimeNet user ID and proxy host fields, directly preventing buffer overflows from malicious payloads.

prevent

SI-16 enforces memory protections such as ASLR and DEP, mitigating arbitrary code execution from the buffer overflow vulnerability.

prevent

SI-2 mandates timely flaw remediation, including patching Prime95 version 29.8 build 6 to eliminate the specific buffer overflow vulnerability.

Security SummaryAI

Prime95 version 29.8 build 6 contains a buffer overflow vulnerability (CWE-122) in the user ID input field, enabling remote attackers to execute arbitrary code. The issue affects the PrimeNet user ID and proxy host fields within this specific build of the Prime95 software, which is used for distributed computing tasks related to Mersenne prime searches.

Remote attackers can exploit this vulnerability over the network with low complexity and no privileges or user interaction required, as indicated by its CVSS 3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By crafting a malicious payload and pasting it into the affected input fields, attackers can trigger a bind shell on TCP port 3110, achieving full remote code execution on the target system.

Advisories and related resources, including a proof-of-concept exploit at https://www.exploit-db.com/exploits/47802, the official Mersenne site at https://www.mersenne.org, and a VulnCheck advisory at https://www.vulncheck.com/advisories/prime-version-build-buffer-overflow-seh, provide further details on the issue.

A public exploit is available, indicating potential for real-world exploitation against unpatched instances of the vulnerable Prime95 build.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Buffer overflow in network-connected Prime95 application enables remote unauthenticated arbitrary code execution (RCE) over the network with no user interaction, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References