PT-2026-4948 · Openssl+5 · Openssl 1.0.2+8

Stanislav Fort

·

Published

2025-01-01

·

Updated

2026-03-15

·

CVE-2025-69418

CVSS v3.1

4.0

Medium

AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Name of the Vulnerable Software and Affected Versions OpenSSL versions 1.1.1 through 3.6 OpenSSL version 1.0.2 is not affected
Description The issue relates to the handling of non-block-aligned input lengths when using the low-level OCB API directly with AES-NI or other hardware-accelerated code paths. Specifically, inputs that are not a multiple of 16 bytes can result in the final partial block remaining unencrypted and unauthenticated. This can expose the trailing 1-15 bytes of a message in cleartext and bypass the authentication tag, potentially allowing an attacker to read or tamper with those bytes without detection. The vulnerability affects applications directly calling the CRYPTO ocb128 encrypt() or CRYPTO ocb128 decrypt() functions. Higher-level implementations like EVP are not affected. The issue was assessed as having low severity.
Recommendations OpenSSL versions 1.1.1 through 3.6: At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Weakness Enumeration

Related Identifiers

ALSA-2026:1472
ALSA-2026:1473
BDU:2026-02935
CVE-2025-69418
ECHO-2C1D-6266-FCE5
MGASA-2026-0029
OPENSUSE-SU-2026:10237-1
OPENSUSE-SU-2026:20152-1
RHSA-2026:1472
RHSA-2026:1473
SUSE-SU-2026:0309-1
SUSE-SU-2026:0310-1
SUSE-SU-2026:0311-1
SUSE-SU-2026:0312-1
SUSE-SU-2026:0331-1
SUSE-SU-2026:0343-1
SUSE-SU-2026:0346-1
SUSE-SU-2026:0358-1
SUSE-SU-2026:0359-1
SUSE-SU-2026:0360-1
SUSE-SU-2026:20211-1
SUSE-SU-2026:20223-1
SUSE-SU-2026:20349-1
SUSE-SU-2026:20373-1
USN-7980-1
USN-7980-2

Affected Products

Freebsd
Ibm Aix
Linuxmint
Openssl 1.0.2
Openssl 1.1.1
Openssl 3.6
Openssl
Rocky Linux
Ubuntu