U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-9230 Detail

Description

Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45 OpenSSL Software Foundation
https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280 OpenSSL Software Foundation
https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def OpenSSL Software Foundation
https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd OpenSSL Software Foundation
https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482 OpenSSL Software Foundation
https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3 OpenSSL Software Foundation
https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba OpenSSL Software Foundation
https://openssl-library.org/news/secadv/20250930.txt OpenSSL Software Foundation

Weakness Enumeration

CWE-ID CWE Name Source
CWE-125 Out-of-bounds Read OpenSSL Software Foundation  
CWE-787 Out-of-bounds Write OpenSSL Software Foundation  

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-9230
NVD Published Date:
09/30/2025
NVD Last Modified:
09/30/2025
Source:
OpenSSL Software Foundation