DNA View

CVE-2025-15468

Medium
Low Medium High Critical
5.9
CVSS Score
Published: Jan 27, 2026
Last Modified: Feb 02, 2026

Vulnerability Description

Issue summary: If an application using the SSL_CIPHER_find() function in
a QUIC protocol client or server receives an unknown cipher suite from
the peer, a NULL dereference occurs.

Impact summary: A NULL pointer dereference leads to abnormal termination of
the running process causing Denial of Service.

Some applications call SSL_CIPHER_find() from the client_hello_cb callback
on the cipher ID received from the peer. If this is done with an SSL object
implementing the QUIC protocol, NULL pointer dereference will happen if
the examined cipher ID is unknown or unsupported.

As it is not very common to call this function in applications using the QUIC
protocol and the worst outcome is Denial of Service, the issue was assessed
as Low severity.

The vulnerable code was introduced in the 3.2 version with the addition
of the QUIC protocol support.

The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,
as the QUIC implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.

OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
N
Attack Complexity
H
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
N
Integrity
N
Availability
H

Known Affected Software

4 configuration(s) from 1 vendor(s)

openssl
Version:
3.3.2
CPE:
cpe:2.3:a:openssl:openssl:3.3.2:*:*:*:*:*:*:*
openssl
Version:
3.5.0
CPE:
cpe:2.3:a:openssl:openssl:3.5.0:*:*:*:*:*:*:*
openssl
Version:
3.3.1
CPE:
cpe:2.3:a:openssl:openssl:3.3.1:*:*:*:*:*:*:*
openssl
Version:
3.3.0
CPE:
cpe:2.3:a:openssl:openssl:3.3.0:*:*:*:*:*:*:*
This vulnerability affects 4 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

4 patches available from vendors

View All Patches
Red Hat

RHSA-2026:1736

RHSA-2026:1736: openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing

Severity
Unknown
Released
Feb 02, 2026
Security Update
Red Hat

RHSA-2026:1472

RHSA-2026:1472: openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing

Severity
Unknown
Released
Jan 28, 2026
Security Update
Red Hat

RHSA-2026:1473

RHSA-2026:1473: openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing

Severity
Unknown
Released
Jan 28, 2026
Security Update
Canonical (Ubuntu)

USN-7980-1

USN-7980-1: OpenSSL vulnerabilities

Severity
Unknown
Released
Jan 27, 2026
Restart Required
Security Update

Severity Details

5.9
out of 10.0
Medium

Weakness Type (CWE)

CWE-476 Top 25 #21

NULL Pointer Dereference

Description
The product dereferences a pointer that it expects to be valid but is NULL.
Exploit Likelihood
Medium
Typical Severity
High
Abstraction Level
Base

Key Information

Published Date
January 27, 2026