Hasty Briefsbeta

Potentially Critical RCE Vulnerability in OpenSSL

7 days ago
  • #CVE-2025-15467
  • #Cybersecurity
  • #OpenSSL
  • New OpenSSL vulnerability CVE-2025-15467 disclosed, a stack overflow issue potentially leading to remote code execution (RCE).
  • Vulnerability rated as 'high' severity by OpenSSL, may be assessed as 'Critical' by NVD.
  • Affected OpenSSL versions: 3.6, 3.5, 3.4, 3.3, 3.0; versions 1.1.1 and 1.0.2 are not affected.
  • FIPS modules in affected versions are not impacted as the CMS implementation is outside the FIPS boundary.
  • Exploitation involves sending a crafted CMS AuthEnvelopedData message with malicious AEAD parameters.
  • Vulnerable APIs and tools include CMS_Decrypt, openssl cms, and openssl smime.
  • Successful code execution demonstrated by JFrog Security Research team, though real-world exploitation may require bypassing mitigations like ASLR and DEP.
  • Recommended upgrades provided for affected versions to mitigate the vulnerability.
  • Vulnerability occurs due to unchecked IV size in CMS AuthEnvelopedData structure, leading to stack overflow before authentication.
  • Organizations advised to patch immediately and review systems processing S/MIME or PKCS#7 content.