MFER Parsing Vulnerability

CRITICAL (9.8)

Threat Intelligence

Low Risk
EPSS Score: 0.08% chance of exploitation (percentile: 24%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The Biosig Project libbiosig is a software library used for parsing MFER files, which are used in various applications to manage and configure BIOS settings. The vulnerability exists in the MFER parsing functionality of libbiosig 3.9.1, allowing an attacker to execute arbitrary code by providing a malicious MFER file.

Am I affected?

You're affected if you use Several stack-based buffer overflow vulnerabilities exists. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

How to fix

To fix this vulnerability, you can:

  • Upgrade to libbiosig version 4.0.0 or later from The Biosig Project website: https://www.thebiosigproject.org/download/
  • Apply immediate mitigations:
    • Restrict network access to your system to prevent the exploitation of this vulnerability.
    • Monitor for suspicious MFER file activity and audit BIOS settings configuration.