
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-based buffer overflow vulnerability (CVE-2025-53557) exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). The vulnerability was discovered by Mark Bereza and Lilith >> of Cisco Talos and was publicly disclosed on August 25, 2025 ([Talos](https://talosintelligence.com/vulnerabilityreports/TALOS-2025-2235), NVD).
The vulnerability exists in the MFER (Medical waveform Format Encoding Rules) parsing functionality. When processing tag 63 frames, the code fails to validate the channel number (chan) against the allocated size of the hdr->CHANNEL array, resulting in a heap-based buffer overflow condition. The vulnerability is tracked as CWE-122 (Heap-based Buffer Overflow) and has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (Talos).
A successful exploitation of this vulnerability can lead to arbitrary code execution. The attacker has control over both the destination of the write (through the channel number) and often the data being written (from the input file), making this a particularly dangerous vulnerability (Talos).
The vulnerability has been patched by the vendor on August 24, 2025. Users should upgrade to a version newer than libbiosig 3.9.0 or apply the latest patches to the Master Branch after commit 35a819fa (Talos).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."