
Cloud Vulnerability DB
A community-led vulnerabilities database
A double-free vulnerability (CVE-2024-22097) exists in the BrainVision Header Parsing functionality of The Biosig Project libbiosig Master Branch (ab0ee111) and version 2.5.0. The vulnerability was discovered by Lilith of Cisco Talos and publicly disclosed on February 20, 2024 (Talos Report).
The vulnerability occurs in the BrainVision file format parsing code, specifically when handling .vhdr header files. The issue arises when processing multiple [Channel Info] tags, where a tmpfile buffer gets freed multiple times without being reallocated. This results in an arbitrary number of frees on a single address, which after careful heap manipulation can lead to code execution. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (Talos Report).
A successful exploitation of this vulnerability could lead to arbitrary code execution on the targeted system. The vulnerability affects the processing of medical signal data (EKG, EEG, etc.) within various file formats, potentially impacting medical and research facilities that use the Biosig library (Talos Report).
The vulnerability has been patched in version 2.6.0 of the Biosig library, which includes improved parser and sanity checks for BrainVision files (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."