Potentially Critical RCE Vulnerability in OpenSSL
7 days ago
- #CVE-2025-15467
- #Cybersecurity
- #OpenSSL
- New OpenSSL vulnerability CVE-2025-15467 disclosed, a stack overflow issue potentially leading to remote code execution (RCE).
- Vulnerability rated as 'high' severity by OpenSSL, may be assessed as 'Critical' by NVD.
- Affected OpenSSL versions: 3.6, 3.5, 3.4, 3.3, 3.0; versions 1.1.1 and 1.0.2 are not affected.
- FIPS modules in affected versions are not impacted as the CMS implementation is outside the FIPS boundary.
- Exploitation involves sending a crafted CMS AuthEnvelopedData message with malicious AEAD parameters.
- Vulnerable APIs and tools include CMS_Decrypt, openssl cms, and openssl smime.
- Successful code execution demonstrated by JFrog Security Research team, though real-world exploitation may require bypassing mitigations like ASLR and DEP.
- Recommended upgrades provided for affected versions to mitigate the vulnerability.
- Vulnerability occurs due to unchecked IV size in CMS AuthEnvelopedData structure, leading to stack overflow before authentication.
- Organizations advised to patch immediately and review systems processing S/MIME or PKCS#7 content.