CVE-2025-2474

9.8 CRITICAL

📋 TL;DR

CVE-2025-2474 is a critical out-of-bounds write vulnerability in the PCX image codec in QNX SDP that allows unauthenticated attackers to cause denial-of-service or execute arbitrary code. This affects QNX SDP versions 8.0, 7.1, and 7.0. Any system processing PCX images through the vulnerable codec is at risk.

💻 Affected Systems

Products:
  • QNX Software Development Platform (SDP)
Versions: 8.0, 7.1, 7.0
Operating Systems: QNX Neutrino RTOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present when processing PCX image files through the affected codec. Systems using QNX SDP for image processing are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, allowing attackers to take complete control of affected systems.

🟠

Likely Case

Denial-of-service crashes or limited code execution in the context of the vulnerable process, potentially leading to system instability.

🟢

If Mitigated

Contained impact through proper network segmentation and process isolation, limiting damage to affected services only.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation via malicious PCX images makes internet-facing systems particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal systems remain vulnerable to attacks via malicious files but have reduced exposure compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires processing a malicious PCX image file. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check BlackBerry advisory for specific patched versions

Vendor Advisory: https://support.blackberry.com/pkb/s/article/140646

Restart Required: Yes

Instructions:

1. Review BlackBerry advisory KB140646. 2. Download and apply the appropriate patch for your QNX SDP version. 3. Restart affected systems and services. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Disable PCX image processing

all

Block or disable processing of PCX image files through the vulnerable codec

# Configuration depends on specific application implementation

Input validation for image files

all

Implement strict validation and sanitization of PCX image files before processing

# Implement file validation in application code

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Deploy application allowlisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check QNX SDP version and verify if PCX image processing is enabled in applications

Check Version:

uname -a or check QNX system information

Verify Fix Applied:

Verify QNX SDP version is updated to patched version and test PCX image processing functionality

📡 Detection & Monitoring

Log Indicators:

  • Process crashes related to image processing
  • Memory access violation errors
  • Unexpected process termination

Network Indicators:

  • Unusual network traffic to/from image processing services
  • Multiple failed image processing attempts

SIEM Query:

source="*qnx*" AND (event_type="crash" OR event_type="memory_violation") AND process_name="*image*"

🔗 References

📤 Share & Export