PT-2026-4948 · Openssl+6 · Openssl 1.0.2+9

Stanislav Fort

·

Published

2025-01-01

·

Updated

2026-04-27

·

CVE-2025-69418

CVSS v3.1

4.0

Medium

VectorAV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Name of the Vulnerable Software and Affected Versions OpenSSL versions 1.1.1 through 3.6 OpenSSL version 1.0.2 is not affected
Description The issue relates to the handling of non-block-aligned input lengths when using the low-level OCB API directly with AES-NI or other hardware-accelerated code paths. Specifically, inputs that are not a multiple of 16 bytes can result in the final partial block remaining unencrypted and unauthenticated. This can expose the trailing 1-15 bytes of a message in cleartext and bypass the authentication tag, potentially allowing an attacker to read or tamper with those bytes without detection. The vulnerability affects applications directly calling the CRYPTO ocb128 encrypt() or CRYPTO ocb128 decrypt() functions. Higher-level implementations like EVP are not affected. The issue was assessed as having low severity.
Recommendations OpenSSL versions 1.1.1 through 3.6: At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Weakness Enumeration

Related Identifiers

ALSA-2026:1472
ALSA-2026:1473
AZL-75272
AZL-75783
AZL-75899
AZL-76128
AZL-76158
AZL-76200
AZL-78546
BDU:2026-02935
CVE-2025-69418
ECHO-2C1D-6266-FCE5
JLSEC-2026-262
MGASA-2026-0029
OESA-2026-1663
OESA-2026-1749
OESA-2026-1750
OESA-2026-1751
OESA-2026-1752
OESA-2026-1753
OPENSUSE-SU-2026:10237-1
OPENSUSE-SU-2026:20152-1
RHSA-2026:1472
RHSA-2026:1473
RHSA-2026:7261
SUSE-SU-2026:0309-1
SUSE-SU-2026:0310-1
SUSE-SU-2026:0311-1
SUSE-SU-2026:0312-1
SUSE-SU-2026:0331-1
SUSE-SU-2026:0343-1
SUSE-SU-2026:0346-1
SUSE-SU-2026:0358-1
SUSE-SU-2026:0359-1
SUSE-SU-2026:0360-1
SUSE-SU-2026:20211-1
SUSE-SU-2026:20223-1
SUSE-SU-2026:20349-1
SUSE-SU-2026:20373-1
USN-7980-1
USN-7980-2

Affected Products

Freebsd
Ibm Aix
Linuxmint
Openssl 1.0.2
Openssl 1.1.1
Openssl 3.6
Openssl
Red Os
Rocky Linux
Ubuntu