
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical heap-based buffer overflow vulnerability has been discovered in HDF5 version 1.14.6 (CVE-2025-2309). The vulnerability affects the H5T_bitcopy function within the Type Conversion Logic component. The issue was identified on March 14, 2025, and its current status is disputed. The vulnerability requires local access to exploit and has been publicly disclosed (NVD, VulDB Submit).
The vulnerability occurs during the bitwise copying of data in the HDF5 type conversion logic, where the library attempts to read 1 byte of data beyond the bounds of an allocated heap memory region. The issue has been assigned CVSS v3.1 Base Score of 5.3 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L. The vulnerability has been classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-122 (Heap-based Buffer Overflow) (NVD).
The vulnerability could lead to memory corruption, application crashes, or potential exploitation for arbitrary code execution. When exploited, it allows an attacker to read beyond allocated memory boundaries, potentially compromising system security (GitHub POC).
The vendor was contacted about this vulnerability but rejected it without detailed explanation. Currently, there are no official patches or fixes available. The real existence of this vulnerability is still under dispute, and the vendor's response was "reject" without further elaboration (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."