CVE-2025-15468
Gravedad:
Pendiente de análisis
Tipo:
CWE-476
Desreferencia a puntero nulo (NULL)
Fecha de publicación:
27/01/2026
Última modificación:
27/01/2026
Descripción
*** Pendiente de traducción *** Issue summary: If an application using the SSL_CIPHER_find() function in<br />
a QUIC protocol client or server receives an unknown cipher suite from<br />
the peer, a NULL dereference occurs.<br />
<br />
Impact summary: A NULL pointer dereference leads to abnormal termination of<br />
the running process causing Denial of Service.<br />
<br />
Some applications call SSL_CIPHER_find() from the client_hello_cb callback<br />
on the cipher ID received from the peer. If this is done with an SSL object<br />
implementing the QUIC protocol, NULL pointer dereference will happen if<br />
the examined cipher ID is unknown or unsupported.<br />
<br />
As it is not very common to call this function in applications using the QUIC <br />
protocol and the worst outcome is Denial of Service, the issue was assessed<br />
as Low severity.<br />
<br />
The vulnerable code was introduced in the 3.2 version with the addition<br />
of the QUIC protocol support.<br />
<br />
The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,<br />
as the QUIC implementation is outside the OpenSSL FIPS module boundary.<br />
<br />
OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.<br />
<br />
OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
Impacto
Referencias a soluciones, herramientas e información
- https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65
- https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2
- https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4
- https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7
- https://openssl-library.org/news/secadv/20260127.txt



