
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-46400 was initially reported on April 23, 2025, but was subsequently rejected by Red Hat Product Security on April 30, 2025, as they determined that this CVE was not needed. The vulnerability was initially described as a segmentation fault in fig2dev version 3.2.9a that could affect availability through local input manipulation via the read_arcobject function (NVD, Ubuntu).
Before rejection, the vulnerability was assessed with a CVSS v3.1 base score of 7.1 (High), with the following vector string: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N. This indicates a locally exploitable vulnerability requiring low attack complexity and privileges, with no user interaction needed, and potential impacts on confidentiality and integrity (Ubuntu).
The initially reported vulnerability suggested potential impacts on system availability through a segmentation fault, with high impacts on both confidentiality and integrity. However, as the CVE was rejected, these impacts were not confirmed (NVD).
No mitigation or workarounds are necessary as Red Hat Product Security determined that this CVE was not needed and rejected it (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."