Cyber Posture

CVE-2025-26519

High

Published: 14 February 2025

Published
14 February 2025
Modified
10 December 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
EPSS Score 0.0003 10.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-26519 is an out-of-bounds write vulnerability (CWE-787) in musl libc versions 0.9.13 through 1.2.5, prior to the release of version 1.2.6. The issue arises during iconv conversion of untrusted EUC-KR text to UTF-8, allowing memory corruption beyond allocated bounds. Affected systems include those using vulnerable musl libc builds, such as certain Linux distributions or embedded environments relying on this lightweight C standard library implementation.

The vulnerability requires local access (AV:L) with no privileges (PR:N) and high attack complexity (AC:H), but no user interaction (UI:N). A successful exploit changes scope (S:C), potentially granting high confidentiality (C:H) and integrity (I:H) impacts alongside low availability (A:L) disruption, for a CVSS v3.1 base score of 8.1. An attacker could trigger the iconv conversion with crafted EUC-KR input to overwrite adjacent memory, possibly leading to arbitrary code execution or denial of service depending on the context and mitigations in place.

Mitigation involves updating to musl libc 1.2.6, which addresses the flaw via patches documented in specific commits: c47ad25ea3b484e10326f933e927c0bc8cded3da and e5adcd97b5196e29991b524237381a0202a60659. Initial disclosure occurred on the oss-security mailing list on 2025-02-13, with discussions in threads at http://www.openwall.com/lists/oss-security/2025/02/13/2 and http://www.openwall.com/lists/oss-security/2025/02/13/3.

Details

CWE(s)
CWE-787

Affected Products

musl-libc
musl
0.9.13 — 1.2.6

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The out-of-bounds write in musl libc iconv allows local exploitation with no privileges and scope change, directly enabling arbitrary code execution that can be leveraged for privilege escalation.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References