CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
5DescriptionNVD
brplot v420.69.1 contains a Null Pointer Dereference (NPD) vulnerability in the br_dagens_handle_once function of its data processing module, leading to unpredictable program behavior, causing segmentation faults, and program crashes.
AnalysisAI
CVE-2025-45331 is a Null Pointer Dereference (NPD) vulnerability in brplot v420.69.1's br_dagens_handle_once function that causes denial of service through segmentation faults and program crashes. The vulnerability is remotely exploitable without authentication or user interaction (CVSS 7.5), making it a high-availability risk for any system processing brplot data. While KEV status and active exploitation data are not provided, the network-accessible attack vector and high availability impact suggest this warrants prioritization for patched deployments.
Technical ContextAI
The vulnerability exists in the data processing module of brplot v420.69.1, specifically within the br_dagens_handle_once function. This is a classic Null Pointer Dereference (CWE-476) where the function fails to validate pointer initialization or null-check return values before dereferencing memory. When processing input data, if a pointer remains uninitialized or becomes null through error conditions, subsequent memory access operations trigger a segmentation fault. The network attack vector (AV:N) indicates the vulnerable function is accessible via network input handling, likely in data parsing routines. This is a memory safety issue common in C/C++ codebases lacking defensive null-checking.
RemediationAI
Primary: Upgrade brplot from v420.69.1 to the patched version (vendor to confirm exact patch version, likely 420.69.2 or 421.0.0). Secondary mitigations pending patch availability: (1) Restrict network access to brplot services using firewall rules (whitelist trusted data sources only); (2) Disable or isolate the br_dagens_handle_once function if it is optional; (3) Run brplot in a sandboxed environment (container, VM) to limit segfault impact; (4) Monitor process crashes and restart services automatically to reduce downtime. Check vendor advisories (brplot GitHub releases, security mailing lists, NVD references) for patch release dates and deployment guidance.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-28022