Introducing Wiz for Exposure Management: Unify, prioritize, and remediate exposures everywhere.

CVE-2025-54351
NixOS vulnerability analysis and mitigation

Overview

CVE-2025-54351 affects iperf versions before 3.19.1, specifically related to a buffer overflow vulnerability in net.c when using the --skip-rx-copy option with MSG_TRUNC in recv. The vulnerability was discovered and reported by Han Lee from Apple Information Security and was disclosed on July 25, 2025 (GitHub Release).

Technical details

The vulnerability exists in the net.c file of iperf and manifests as a buffer overflow condition when the --skip-rx-copy option is used in conjunction with MSG_TRUNC in recv functionality. The issue has been assigned a CVSS v3.1 base score of 8.9 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L, indicating a network-accessible vulnerability with high complexity, no privileges required, and no user interaction needed (NVD).

Impact

The vulnerability can lead to buffer overflow conditions, potentially allowing attackers to execute arbitrary code or cause system crashes. The CVSS score indicates that successful exploitation could result in high impacts to both confidentiality and integrity, with a low impact on availability (NVD).

Mitigation and workarounds

Users are strongly advised to upgrade to iperf version 3.19.1 or later, which contains the fix for this vulnerability. The patch modifies the handling of MSG_TRUNC in the recv functionality to prevent buffer overflow conditions (GitHub Release).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management