CVE-2025-69421
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
27/01/2026
Last modified:
27/01/2026
Description
Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer<br />
dereference in the PKCS12_item_decrypt_d2i_ex() function.<br />
<br />
Impact summary: A NULL pointer dereference can trigger a crash which leads to<br />
Denial of Service for an application processing PKCS#12 files.<br />
<br />
The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct<br />
parameter is NULL before dereferencing it. When called from<br />
PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can<br />
be NULL, causing a crash. The vulnerability is limited to Denial of Service<br />
and cannot be escalated to achieve code execution or memory disclosure.<br />
<br />
Exploiting this issue requires an attacker to provide a malformed PKCS#12 file<br />
to an application that processes it. For that reason the issue was assessed as<br />
Low severity according to our Security Policy.<br />
<br />
The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,<br />
as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.<br />
<br />
OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
Impact
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b
- https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7
- https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd
- https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3
- https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c
- https://openssl-library.org/news/secadv/20260127.txt



