CVE-2025-9230
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
30/09/2025
Last modified:
04/11/2025
Description
Issue summary: An application trying to decrypt CMS messages encrypted using<br />
password based encryption can trigger an out-of-bounds read and write.<br />
<br />
Impact summary: This out-of-bounds read may trigger a crash which leads to<br />
Denial of Service for an application. The out-of-bounds write can cause<br />
a memory corruption which can have various consequences including<br />
a Denial of Service or Execution of attacker-supplied code.<br />
<br />
Although the consequences of a successful exploit of this vulnerability<br />
could be severe, the probability that the attacker would be able to<br />
perform it is low. Besides, password based (PWRI) encryption support in CMS<br />
messages is very rarely used. For that reason the issue was assessed as<br />
Moderate severity according to our Security Policy.<br />
<br />
The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br />
issue, as the CMS implementation is outside the OpenSSL FIPS module<br />
boundary.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45
- https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280
- https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def
- https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd
- https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482
- https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3
- https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba
- https://openssl-library.org/news/secadv/20250930.txt
- http://www.openwall.com/lists/oss-security/2025/09/30/5
- https://lists.debian.org/debian-lts-announce/2025/10/msg00001.html



