CVE-2025-27363

8.1 HIGH CISA KEV

📋 TL;DR

This CVE describes an out-of-bounds write vulnerability in FreeType versions 2.13.0 and below when parsing TrueType GX and variable font files. The vulnerability allows arbitrary code execution through heap corruption and may have been exploited in the wild. Any system or application using vulnerable FreeType versions for font rendering is affected.

💻 Affected Systems

Products:
  • FreeType
Versions: 2.13.0 and below
Operating Systems: All operating systems using FreeType
Default Config Vulnerable: ⚠️ Yes
Notes: Any application or system that uses FreeType for font rendering, including web browsers, document viewers, and operating system components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution leading to complete data loss, lateral movement, and persistent backdoors.

🟠

Likely Case

Application crash leading to denial of service, with potential for code execution in memory-safe environments.

🟢

If Mitigated

Application crash without code execution if exploit fails or memory protections are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires processing malicious font files. The advisory mentions possible in-the-wild exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FreeType 2.13.1 or later

Vendor Advisory: https://www.facebook.com/security/advisories/cve-2025-27363

Restart Required: No

Instructions:

1. Update FreeType to version 2.13.1 or later. 2. For embedded systems, rebuild with patched FreeType library. 3. For Linux distributions, use package manager updates. 4. For applications bundling FreeType, update the bundled library.

🔧 Temporary Workarounds

Disable TrueType GX and variable font processing

all

Configure applications to avoid processing TrueType GX and variable fonts if not required.

🧯 If You Can't Patch

  • Implement application allowlisting to prevent execution of untrusted font files.
  • Use memory protection mechanisms like ASLR and DEP to reduce exploit success.

🔍 How to Verify

Check if Vulnerable:

Check FreeType version with 'freetype-config --version' or examine library files. Versions 2.13.0 and below are vulnerable.

Check Version:

freetype-config --version

Verify Fix Applied:

Verify FreeType version is 2.13.1 or later using version check command.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes related to font processing
  • Memory access violation errors in application logs

Network Indicators:

  • Unusual font file downloads
  • Font file processing from untrusted sources

SIEM Query:

search for 'freetype' AND ('crash' OR 'segmentation fault' OR 'access violation') in application logs

🔗 References

📤 Share & Export