DNA View

High Severity Vulnerability

This vulnerability has been rated as High severity. Immediate action is recommended.

CVE-2025-69421

High
Low Medium High Critical
7.5
CVSS Score
Published: Jan 27, 2026
Last Modified: Feb 28, 2026

Vulnerability Description

Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer
dereference in the PKCS12_item_decrypt_d2i_ex() function.

Impact summary: A NULL pointer dereference can trigger a crash which leads to
Denial of Service for an application processing PKCS#12 files.

The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct
parameter is NULL before dereferencing it. When called from
PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can
be NULL, causing a crash. The vulnerability is limited to Denial of Service
and cannot be escalated to achieve code execution or memory disclosure.

Exploiting this issue requires an attacker to provide a malformed PKCS#12 file
to an application that processes it. For that reason the issue was assessed as
Low severity according to our Security Policy.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
N
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
N
Integrity
N
Availability
H

Known Affected Software

22 configuration(s) from 1 vendor(s)

openssl
Version:
3.0.0
CPE:
cpe:2.3:a:openssl:openssl:3.0.0:beta2:*:*:*:*:*:*
openssl
Version:
3.0.1
CPE:
cpe:2.3:a:openssl:openssl:3.0.1:*:*:*:*:*:*:*
openssl
Version:
3.0.4
CPE:
cpe:2.3:a:openssl:openssl:3.0.4:*:*:*:*:*:*:*
openssl
Version:
3.0.8
CPE:
cpe:2.3:a:openssl:openssl:3.0.8:*:*:*:*:*:*:*
openssl
Version:
3.0.9
CPE:
cpe:2.3:a:openssl:openssl:3.0.9:*:*:*:*:*:*:*
openssl
Version:
1.0.2
CPE:
cpe:2.3:a:openssl:openssl:1.0.2:-:*:*:*:*:*:*
openssl
Version:
3.0.11
CPE:
cpe:2.3:a:openssl:openssl:3.0.11:*:*:*:*:*:*:*
openssl
Version:
3.3.2
CPE:
cpe:2.3:a:openssl:openssl:3.3.2:*:*:*:*:*:*:*
openssl
Version:
3.0.2
CPE:
cpe:2.3:a:openssl:openssl:3.0.2:*:*:*:*:*:*:*
openssl
Version:
1.1.1
CPE:
cpe:2.3:a:openssl:openssl:1.1.1:-:*:*:*:*:*:*
openssl
Version:
3.0.7
CPE:
cpe:2.3:a:openssl:openssl:3.0.7:*:*:*:*:*:*:*
openssl
Version:
3.0.12
CPE:
cpe:2.3:a:openssl:openssl:3.0.12:*:*:*:*:*:*:*
openssl
Version:
3.5.0
CPE:
cpe:2.3:a:openssl:openssl:3.5.0:*:*:*:*:*:*:*
openssl
Version:
3.0.5
CPE:
cpe:2.3:a:openssl:openssl:3.0.5:*:*:*:*:*:*:*
openssl
Version:
3.0.14
CPE:
cpe:2.3:a:openssl:openssl:3.0.14:*:*:*:*:*:*:*
openssl
Version:
3.3.1
CPE:
cpe:2.3:a:openssl:openssl:3.3.1:*:*:*:*:*:*:*
openssl
Version:
3.3.0
CPE:
cpe:2.3:a:openssl:openssl:3.3.0:*:*:*:*:*:*:*
openssl
Version:
3.0.13
CPE:
cpe:2.3:a:openssl:openssl:3.0.13:*:*:*:*:*:*:*
openssl
Version:
3.0.6
CPE:
cpe:2.3:a:openssl:openssl:3.0.6:*:*:*:*:*:*:*
openssl
Version:
3.0.3
CPE:
cpe:2.3:a:openssl:openssl:3.0.3:*:*:*:*:*:*:*
openssl
Version:
3.0.15
CPE:
cpe:2.3:a:openssl:openssl:3.0.15:*:*:*:*:*:*:*
openssl
Version:
3.0.10
CPE:
cpe:2.3:a:openssl:openssl:3.0.10:*:*:*:*:*:*:*
This vulnerability affects 22 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

6 patches available from vendors

View All Patches
Oracle

CPUAPR2026

Oracle Critical Patch Update Advisory - April 2026

Severity
Critical
Released
Apr 21, 2026
Restart Required
Security Update
Red Hat

RHSA-2026:1736

RHSA-2026:1736: openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing

Severity
Unknown
Released
Feb 02, 2026
Security Update
Red Hat

RHSA-2026:1472

RHSA-2026:1472: openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing

Severity
Unknown
Released
Jan 28, 2026
Security Update
Red Hat

RHSA-2026:1473

RHSA-2026:1473: openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing

Severity
Unknown
Released
Jan 28, 2026
Security Update
Canonical (Ubuntu)

USN-7980-2

USN-7980-2: OpenSSL vulnerabilities

Severity
Unknown
Released
Jan 27, 2026
Security Update
Canonical (Ubuntu)

USN-7980-1

USN-7980-1: OpenSSL vulnerabilities

Severity
Unknown
Released
Jan 27, 2026
Restart Required
Security Update

Severity Details

7.5
out of 10.0
High

Weakness Type (CWE)

CWE-476 Top 25 #21

NULL Pointer Dereference

Description
The product dereferences a pointer that it expects to be valid but is NULL.
Exploit Likelihood
Medium
Typical Severity
High
Abstraction Level
Base

Key Information

Published Date
January 27, 2026