๐Ÿ” CVE Alert

CVE-2025-9230

HIGH 7.5

Out-of-bounds read & write in RFC 3211 KEK Unwrap

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.

CWE CWE-125 CWE-787
Vendor openssl
Product openssl
Ecosystems
Industries
TechnologySecurity
Published Sep 30, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for openssl openssl

Be the first to know when new high vulnerabilities affecting openssl openssl are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

OpenSSL / OpenSSL
3.5.0 < 3.5.4 3.4.0 < 3.4.3 3.3.0 < 3.3.5 3.2.0 < 3.2.6 3.0.0 < 3.0.18 1.1.1 < 1.1.1zd 1.0.2 < 1.0.2zm

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
openssl-library.org: https://openssl-library.org/news/secadv/20250930.txt github.com: https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482 github.com: https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280 github.com: https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45 github.com: https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd github.com: https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def github.openssl.org: https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba github.openssl.org: https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00001.html openwall.com: http://www.openwall.com/lists/oss-security/2025/09/30/5 cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-089022.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-485750.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html

Credits

๐Ÿ” Stanislav Fort (Aisle Research) Stanislav Fort (Aisle Research) Viktor Dukhovni