PT-2026-4942 · Openssl+4 · Openssl+4
Stanislav Fort
·
Published
2025-01-01
·
Updated
2026-03-15
·
CVE-2025-15468
CVSS v3.1
5.9
Medium
| AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
OpenSSL versions 3.3 through 3.6
Description
A flaw exists in OpenSSL where the
SSL CIPHER find() function, when used in a QUIC protocol client or server, can experience a NULL pointer dereference if it receives an unknown cipher suite from its peer. This can lead to a denial of service, causing the process to terminate unexpectedly. The issue was introduced with the addition of QUIC protocol support in version 3.2. The FIPS modules in versions 3.6, 3.5, 3.4, and 3.3 are not affected as the QUIC implementation is outside the OpenSSL FIPS module boundary. The vulnerable function is SSL CIPHER find().Recommendations
OpenSSL versions 3.3 through 3.6 should be updated to a fixed version.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
DoS
NULL Pointer Dereference
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Freebsd
Linuxmint
Openssl
Rocky Linux
Ubuntu