Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-54349

CVE-2025-54349: Iperf3 Buffer Overflow Vulnerability

CVE-2025-54349 is a heap-based buffer overflow flaw in Iperf3 caused by an off-by-one error in iperf_auth.c. This article covers technical details, affected versions before 3.19.1, security impact, and mitigation.

Published: March 11, 2026

CVE-2025-54349 Overview

CVE-2025-54349 is a critical heap-based buffer overflow vulnerability affecting iperf3, the widely-used network bandwidth measurement tool. The vulnerability exists in iperf_auth.c and stems from an off-by-one error that can lead to heap memory corruption. This flaw allows remote attackers to potentially execute arbitrary code or cause denial of service conditions on systems running vulnerable versions of iperf3.

Critical Impact

This vulnerability has the highest possible severity rating, enabling network-based attackers to potentially achieve full system compromise without any user interaction or authentication requirements. The scope is changed, meaning successful exploitation can impact resources beyond the vulnerable component.

Affected Products

  • iperf3 versions prior to 3.19.1
  • ESnet iperf3 installations on Linux, Unix, and other supported platforms
  • Debian systems with unpatched iperf3 packages

Discovery Timeline

  • August 3, 2025 - CVE-2025-54349 published to NVD
  • November 3, 2025 - Last updated in NVD database

Technical Details for CVE-2025-54349

Vulnerability Analysis

This vulnerability falls under CWE-193 (Off-by-one Error), a common programming mistake that occurs when a loop iterates one time too many or too few, or when buffer size calculations are incorrect by a single byte. In the context of iperf_auth.c, the off-by-one error results in writing beyond the allocated heap buffer boundary.

The authentication component of iperf3 handles user credentials and session management. When processing authentication-related data, the vulnerable code miscalculates buffer boundaries, allowing an attacker to write one byte beyond the intended buffer space. While a single byte overflow might seem minimal, in heap memory this can corrupt adjacent memory structures, potentially leading to arbitrary code execution through heap metadata manipulation.

Root Cause

The root cause is an off-by-one error in iperf_auth.c where buffer size calculations or loop bounds fail to properly account for string terminators or boundary conditions. This type of error commonly occurs when developers confuse between inclusive and exclusive bounds, or when calculating buffer sizes without accounting for null terminators in C strings.

Attack Vector

The vulnerability is exploitable over the network without requiring authentication or user interaction. An attacker can craft malicious network packets targeting the iperf3 authentication mechanism. When the vulnerable code processes these packets, the off-by-one error triggers a heap buffer overflow.

The attack scenario involves:

  1. Identifying a target system running a vulnerable iperf3 server (versions before 3.19.1)
  2. Sending specially crafted authentication data to the iperf3 service
  3. Triggering the off-by-one error to overflow heap memory
  4. Potentially achieving code execution or causing service disruption

Due to the network attack vector and lack of required privileges, this vulnerability poses a significant risk to exposed iperf3 servers, particularly those used for network performance testing in production environments.

Detection Methods for CVE-2025-54349

Indicators of Compromise

  • Unexpected crashes or segmentation faults in the iperf3 process
  • Abnormal memory allocation patterns in iperf3 authentication routines
  • Core dumps indicating heap corruption in iperf_auth.c functions
  • Unusual network traffic patterns targeting iperf3 service ports (typically TCP 5201)

Detection Strategies

  • Monitor for iperf3 process crashes or abnormal terminations indicating potential exploitation attempts
  • Implement network intrusion detection rules for malformed iperf3 authentication packets
  • Use memory protection tools (ASAN, Valgrind) in testing environments to detect heap corruption
  • Deploy endpoint detection capabilities to identify post-exploitation activity following iperf3 compromise

Monitoring Recommendations

  • Enable detailed logging for iperf3 services to capture authentication failures and unusual connection patterns
  • Configure SIEM alerts for multiple iperf3 process restarts in short time periods
  • Monitor system resource usage for signs of exploitation such as unexpected child processes spawned by iperf3
  • Track network connections to iperf3 ports from unexpected source addresses

How to Mitigate CVE-2025-54349

Immediate Actions Required

  • Upgrade iperf3 to version 3.19.1 or later immediately on all affected systems
  • If immediate patching is not possible, disable or restrict access to iperf3 services until patching can be completed
  • Review firewall rules to ensure iperf3 is not unnecessarily exposed to untrusted networks
  • Audit systems for any signs of compromise before and after applying patches

Patch Information

The vulnerability has been addressed in iperf3 version 3.19.1. The fix is available through the official GitHub release. The specific commit addressing this vulnerability can be reviewed in the GitHub commit.

For Debian-based systems, security updates are available through the official package repositories. Refer to the Debian LTS Security Announcement for distribution-specific guidance.

Workarounds

  • Restrict network access to iperf3 services using firewall rules to allow only trusted IP addresses
  • Disable authentication features if not required in your environment (reduces attack surface for this specific vulnerability)
  • Run iperf3 in isolated network segments or containers to limit potential impact of exploitation
  • Consider temporary service suspension if the risk profile is unacceptable pending patch deployment
bash
# Configuration example
# Restrict iperf3 access using iptables
iptables -A INPUT -p tcp --dport 5201 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 5201 -j DROP

# Verify installed iperf3 version
iperf3 --version

# Update iperf3 on Debian/Ubuntu systems
sudo apt update && sudo apt install iperf3

# Update iperf3 on RHEL/CentOS systems
sudo yum update iperf3

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechIperf

  • SeverityCRITICAL

  • CVSS Score10.0

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-193
  • Technical References
  • GitHub Release 3.19.1

  • Debian LTS Announcement
  • Vendor Resources
  • GitHub Commit Update
  • Related CVEs
  • CVE-2025-54351: iPerf3 Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English