CVE-2025-1744

9.8 CRITICAL

📋 TL;DR

CVE-2025-1744 is an out-of-bounds write vulnerability in radare2 that allows heap-based buffer over-read or buffer overflow. This affects all users running radare2 versions before 5.9.9. Attackers could exploit this to execute arbitrary code or cause denial of service.

💻 Affected Systems

Products:
  • radare2
Versions: All versions before 5.9.9
Operating Systems: Linux, Windows, macOS, BSD
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of radare2 before the patched version are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Application crash (denial of service) or limited information disclosure from memory reads.

🟢

If Mitigated

Application crash with no data loss if proper sandboxing and privilege separation are implemented.

🌐 Internet-Facing: MEDIUM - radare2 is primarily a local analysis tool, but could be exposed through web interfaces or automated analysis systems.
🏢 Internal Only: HIGH - Attackers with internal access could exploit this to escalate privileges or move laterally through networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

The vulnerability requires feeding specially crafted input to radare2, which could be automated. No public exploit code is currently known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.9

Vendor Advisory: https://github.com/radareorg/radare2/pull/23969

Restart Required: No

Instructions:

1. Update radare2 to version 5.9.9 or later using your package manager. 2. For manual installation: git clone https://github.com/radareorg/radare2 && cd radare2 && sys/install.sh. 3. Verify the update with 'r2 -v'.

🔧 Temporary Workarounds

Restrict radare2 usage

linux

Limit radare2 execution to trusted users and environments only

chmod 750 /usr/bin/r2
setfacl -m u:trusteduser:rx /usr/bin/r2

Sandbox execution

linux

Run radare2 in isolated containers or virtual machines

docker run --rm -it radareorg/radare2:latest
firejail --private /usr/bin/r2

🧯 If You Can't Patch

  • Remove radare2 from production systems and use only in isolated analysis environments
  • Implement strict input validation and sanitization for any data processed by radare2

🔍 How to Verify

Check if Vulnerable:

Run 'r2 -v' and check if version is below 5.9.9

Check Version:

r2 -v | grep -o '\d\.\d\.\d+'

Verify Fix Applied:

Run 'r2 -v' and confirm version is 5.9.9 or higher

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault or crash logs from radare2 processes
  • Unusual memory access patterns in system logs

Network Indicators:

  • Unusual network connections originating from radare2 processes

SIEM Query:

process_name:"r2" AND (event_type:"crash" OR exit_code:139)

🔗 References

📤 Share & Export