Skip to content

Commit 234abd4

Browse files
committed
post: fixes for CVE-2025-15467
1 parent d67b496 commit 234abd4

1 file changed

Lines changed: 21 additions & 5 deletions

File tree

post/potential-rce-vulnerabilityin-openssl-cve-2025-15467.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,14 +26,30 @@ FIPS modules in 3.6, 3.5, 3.4, 3.3, and 3.0 are not affected, as the CMS impleme
2626

2727
## Reproducing CVE-2025-15467
2828

29-
**Our research team has managed to reproduce the vulnerability** by calling the [**CMS\_Decrypt**](https://docs.openssl.org/3.2/man3/CMS_decrypt/) API directly, which means that OpenSSL applications that directly call this API are vulnerable to CVE-2025-15467.
29+
**Our research team has managed to reproduce the vulnerability** by calling the [**CMS\_Decrypt**](https://docs.openssl.org/3.2/man3/CMS_decrypt/) API directly -
3030
![](/img/RealTimePostImage/post/openssl/image2.png)
3131

32-
Exploitation can also be achieved when applications are using the `openssl cms` CLI tool to decrypt untrusted data:
3332

34-
```shell
35-
openssl cms -decrypt -in untrusted_data.pem
36-
```
33+
34+
We have observed the following cases to be vulnerable to CVE-2025-15467 -
35+
36+
A. OpenSSL-based applications that call any of the following APIs -
37+
38+
* `CMS_RecipientInfo_decrypt`
39+
* `CMS_decrypt_set1_pkey_and_peer`
40+
* `CMS_decrypt_set1_pkey`
41+
* `CMS_decrypt`
42+
* `PKCS7_decrypt`
43+
* `EVP_CIPHER_asn1_to_param`
44+
* `CMS_EnvelopedData_decrypt`
45+
46+
47+
48+
B. Applications that invoke any of the following OpenSSL tools -
49+
* `openssl cms`
50+
* `openssl smime`
51+
52+
3753

3854
Note that this is only an initial assessment and more attack vectors are likely to be relevant, stay tuned as we update this blog.
3955

0 commit comments

Comments
 (0)