Skip to content

A vulnerability was detected in appneta tcpreplay up to 4...

Moderate severity Unreviewed Published Aug 24, 2025 to the GitHub Advisory Database • Updated Aug 24, 2025

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

A vulnerability was detected in appneta tcpreplay up to 4.5.1. Impacted is the function tcpedit_post_args of the file /src/tcpedit/parse_args.c. The manipulation results in null pointer dereference. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 4.5.2-beta2 is recommended to address this issue. Upgrading the affected component is advised. The vendor explains, that he was "[a]ble to reproduce in 6fcbf03 but not in 4.5.2-beta2".

References

Published by the National Vulnerability Database Aug 24, 2025
Published to the GitHub Advisory Database Aug 24, 2025
Last updated Aug 24, 2025

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(2nd percentile)

Weaknesses

Improper Resource Shutdown or Release

The product does not release or incorrectly releases a resource before it is made available for re-use. Learn more on MITRE.

CVE ID

CVE-2025-9384

GHSA ID

GHSA-gc8m-9gpv-3rpr

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.