CVE-2025-69420

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/01/2026
Last modified:
02/02/2026

Description

Issue summary: A type confusion vulnerability exists in the TimeStamp Response<br /> verification code where an ASN1_TYPE union member is accessed without first<br /> validating the type, causing an invalid or NULL pointer dereference when<br /> processing a malformed TimeStamp Response file.<br /> <br /> Impact summary: An application calling TS_RESP_verify_response() with a<br /> malformed TimeStamp Response can be caused to dereference an invalid or<br /> NULL pointer when reading, resulting in a Denial of Service.<br /> <br /> The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()<br /> access the signing cert attribute value without validating its type.<br /> When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory<br /> through the ASN1_TYPE union, causing a crash.<br /> <br /> Exploiting this vulnerability requires an attacker to provide a malformed<br /> TimeStamp Response to an application that verifies timestamp responses. The<br /> TimeStamp protocol (RFC 3161) is not widely used and the impact of the<br /> exploit is just a Denial of Service. For these reasons the issue was<br /> assessed as Low severity.<br /> <br /> The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,<br /> as the TimeStamp Response implementation is outside the OpenSSL FIPS module<br /> boundary.<br /> <br /> OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.<br /> <br /> OpenSSL 1.0.2 is not affected by this issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1.1.1 (including) 1.1.1ze (excluding)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.0.0 (including) 3.0.19 (excluding)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.3.0 (including) 3.3.6 (excluding)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.4.0 (including) 3.4.4 (excluding)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.5.0 (including) 3.5.5 (excluding)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 3.6.0 (including) 3.6.1 (excluding)