
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-buffer-overflow vulnerability has been identified in ntopng 6.2, specifically within the Flow::dissectMDNS function. The vulnerability was initially disclosed on November 21, 2024, and received updates through July 2025 (NVD, Ubuntu).
The vulnerability is classified with a CVSS 3.1 Base Score of 6.2 (Medium severity). The technical assessment indicates it is a local attack vector (AV:L) with low attack complexity (AC:L), requiring no privileges (PR:N) and no user interaction (UI:N). The scope is unchanged (S:U), with no impact on confidentiality (C:N) or integrity (I:N), but high impact on availability (A:H). The vulnerability is categorized under CWE-120: Buffer Copy without Checking Size of Input (NVD).
The vulnerability primarily affects system availability, with a high impact rating in this category. While confidentiality and integrity remain unaffected, the heap-buffer-overflow condition could potentially lead to system crashes or service disruptions (NVD).
The vulnerability affects multiple Ubuntu releases including 25.10, 25.04, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS, and 16.04 LTS, all of which are currently marked as 'Needs evaluation' status. Users are advised to monitor their respective distribution's security advisories for updates (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."