GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Malicious Cyber Actors Use Buffer Overflow Vulnerabilities to Compromise Software

Cyber threats are evolving, but one vulnerability remains stubbornly persistent—buffer overflows. Despite decades of known solutions, many software manufacturers continue to develop products with these security flaws, putting users at risk. The latest Secure by Design Alert from CISA and the FBI calls on the industry to eliminate these defects by adopting memory-safe programming languages and proactive security measures. By addressing these vulnerabilities at the source, manufacturers can protect both consumers and national security from preventable cyber threats.

  • Author(s):
  • Cybersecurity and Infrastructure Security Agency
  • Federal Bureau of Investigation
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Malicious Cyber Actors Use Buffer Overflow Vulnerabilities to Compromise Software
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:Cybersecurity and Infrastructure Security Agency (CISA)
Published:February 11, 2025
License:Public Domain

Featured Content

Contact Publisher

Claim Content