Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-54351

CVE-2025-54351: iPerf3 Buffer Overflow Vulnerability

CVE-2025-54351 is a buffer overflow vulnerability in iPerf3 that occurs when using the --skip-rx-copy option. This article covers the technical details, affected versions, security impact, and mitigation strategies.

Published: March 11, 2026

CVE-2025-54351 Overview

A critical buffer overflow vulnerability has been identified in iperf3, the widely-used network bandwidth measurement and testing tool. The vulnerability exists in net.c when the --skip-rx-copy option is used in conjunction with MSG_TRUNC in the recv function. This flaw allows attackers to potentially execute arbitrary code or cause denial of service conditions through specially crafted network packets targeting vulnerable iperf3 installations.

Critical Impact

This buffer overflow vulnerability in iperf3's network receive path can be exploited remotely without authentication, potentially allowing complete system compromise on any host running a vulnerable iperf3 server or client with the --skip-rx-copy flag enabled.

Affected Products

  • Es iperf3 version 3.19 and earlier
  • iperf3 installations using the --skip-rx-copy UDP zerocopy feature
  • Network testing environments with exposed iperf3 services

Discovery Timeline

  • 2025-08-03 - CVE-2025-54351 published to NVD
  • 2025-10-17 - Last updated in NVD database

Technical Details for CVE-2025-54351

Vulnerability Analysis

The vulnerability stems from improper handling of the nleft variable in the Nrecv() function within net.c. When the --skip-rx-copy flag is used for UDP operations, the code utilizes MSG_TRUNC in the socket options which can cause the receive operation to return a value larger than the buffer size. The original implementation declared nleft as a signed ssize_t type with a comment acknowledging it "may get negative value for SKIP-RX-COPY UDP." However, this signed arithmetic led to incorrect boundary calculations, allowing buffer overflow conditions when processing truncated UDP datagrams.

Root Cause

The root cause lies in the type mismatch and improper boundary checking in the receive buffer handling code. The nleft variable was declared as a signed ssize_t to accommodate potential negative values during zerocopy UDP operations with MSG_TRUNC. However, this design decision created a situation where arithmetic operations on the remaining buffer space could underflow, bypassing buffer boundary checks and allowing writes beyond the allocated buffer region. The fix corrects this by changing nleft to an unsigned size_t type, eliminating the possibility of negative value exploitation.

Attack Vector

This vulnerability is exploitable over the network without requiring authentication or user interaction. An attacker can target any iperf3 server or client configured with the --skip-rx-copy option by sending specially crafted UDP packets designed to trigger the buffer overflow condition. The attack exploits the MSG_TRUNC socket option behavior where the return value indicates the total message size rather than the bytes copied, causing the signed integer to wrap negative and bypass size validation.

c
 Nrecv(int fd, char *buf, size_t count, int prot, int sock_opt)
 {
     register ssize_t r;
-    // `nleft` must be signed as it may get negative value for SKIP-RX-COPY UDP (MSG_TRUNC in sock_opt).
-    register ssize_t nleft = count;
-    register size_t total = 0;
+    register size_t nleft = count;
     struct iperf_time ftimeout = { 0, 0 };
 
     fd_set rfdset;

Source: GitHub Commit 969b7f70c447513e92c9798f22e82b40ebc53bf0

Detection Methods for CVE-2025-54351

Indicators of Compromise

  • Unexpected crashes or segmentation faults in iperf3 processes during UDP testing
  • Abnormal memory consumption patterns in iperf3 service processes
  • Core dumps from iperf3 processes with stack traces involving Nrecv() or net.c functions
  • Unusual network traffic patterns targeting iperf3 default ports (5201/TCP, 5201/UDP)

Detection Strategies

  • Monitor for iperf3 processes running with the --skip-rx-copy flag using process monitoring tools
  • Implement network intrusion detection rules for malformed UDP traffic targeting iperf3 services
  • Review system logs for repeated iperf3 process crashes or restarts
  • Deploy file integrity monitoring on iperf3 binaries to detect unauthorized modifications

Monitoring Recommendations

  • Audit all systems for iperf3 installations and verify version numbers against vulnerable versions
  • Implement centralized logging for iperf3 service activity and error conditions
  • Monitor network perimeter for unexpected inbound connections to iperf3 service ports
  • Enable process crash reporting to capture and analyze potential exploitation attempts

How to Mitigate CVE-2025-54351

Immediate Actions Required

  • Upgrade iperf3 to version 3.19.1 or later immediately
  • Discontinue use of the --skip-rx-copy flag until systems are patched
  • Restrict network access to iperf3 services using firewall rules
  • Review deployment scripts and configurations to remove vulnerable options

Patch Information

The vulnerability has been addressed in iperf3 version 3.19.1. The fix modifies the variable type declaration in the Nrecv() function from signed ssize_t to unsigned size_t, eliminating the integer underflow condition that enabled the buffer overflow. Organizations should apply this update through their package management systems or compile from the official source. The security patch is available in commit 969b7f70c447513e92c9798f22e82b40ebc53bf0. For detailed release information, refer to the iperf3 3.19.1 Release Notes.

Workarounds

  • Remove or disable the --skip-rx-copy option from all iperf3 invocations until patched
  • Implement network segmentation to isolate iperf3 testing infrastructure from production networks
  • Use firewall rules to restrict iperf3 access to trusted IP addresses only
  • Consider using alternative network performance testing tools until the patch can be applied
bash
# Configuration example
# Verify current iperf3 version
iperf3 --version

# Update iperf3 on Debian/Ubuntu systems
sudo apt update && sudo apt install --only-upgrade iperf3

# Update iperf3 on RHEL/CentOS systems
sudo yum update iperf3

# Firewall rule to restrict iperf3 access (iptables example)
sudo iptables -A INPUT -p tcp --dport 5201 -s 10.0.0.0/8 -j ACCEPT
sudo iptables -A INPUT -p udp --dport 5201 -s 10.0.0.0/8 -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 5201 -j DROP
sudo iptables -A INPUT -p udp --dport 5201 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechIperf

  • SeverityCRITICAL

  • CVSS Score10.0

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-420
  • Technical References
  • GitHub Release 3.19.1
  • Vendor Resources
  • GitHub Commit Update
  • Related CVEs
  • CVE-2025-54349: Iperf3 Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English