Vulnerabilities 3.5

If you think you have found a security bug in OpenSSL, please report it to us.

Show issues fixed only in OpenSSL 3.5, 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1, 1.1.0, 1.0.2, 1.0.1, 1.0.0, 0.9.8, 0.9.7, 0.9.6, or all versions.

CVE-2025-9230

Severity
Moderate
Published at
30 September 2025
Title
Out-of-bounds read & write in RFC 3211 KEK Unwrap
Found by
Stanislav Fort (Aisle Research)
Fix developed by
Stanislav Fort (Aisle Research) and Viktor Dukhovni
Affected
  • from 3.5.0 before 3.5.4
  • from 3.4.0 before 3.4.3
  • from 3.3.0 before 3.3.5
  • from 3.2.0 before 3.2.6
  • from 3.0.0 before 3.0.18
  • from 1.1.1 before 1.1.1zd
  • from 1.0.2 before 1.0.2zm
References

Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.

Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.

CVE-2025-9231

Severity
Moderate
Published at
30 September 2025
Title
Timing side-channel in SM2 algorithm on 64 bit ARM
Found by
Stanislav Fort (Aisle Research)
Fix developed by
Stanislav Fort (Aisle Research) and Tomas Mraz
Affected
  • from 3.5.0 before 3.5.4
  • from 3.4.0 before 3.4.3
  • from 3.3.0 before 3.3.5
  • from 3.2.0 before 3.2.6
References

Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms.

Impact summary: A timing side-channel in SM2 signature computations on 64 bit ARM platforms could allow recovering the private key by an attacker..

While remote key recovery over a network was not attempted by the reporter, timing measurements revealed a timing signal which may allow such an attack.

OpenSSL does not directly support certificates with SM2 keys in TLS, and so this CVE is not relevant in most TLS contexts. However, given that it is possible to add support for such certificates via a custom provider, coupled with the fact that in such a custom provider context the private key may be recoverable via remote timing measurements, we consider this to be a Moderate severity issue.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as SM2 is not an approved algorithm.

CVE-2025-9232

Severity
Low
Published at
30 September 2025
Title
Out-of-bounds read in HTTP client no_proxy handling
Found by
Stanislav Fort (Aisle Research)
Fix developed by
Stanislav Fort (Aisle Research)
Affected
  • from 3.5.0 before 3.5.4
  • from 3.4.0 before 3.4.3
  • from 3.3.3 before 3.3.5
  • from 3.2.4 before 3.2.6
  • from 3.0.16 before 3.0.18
References

Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the ’no_proxy’ environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address.

Impact summary: An out-of-bounds read can trigger a crash which leads to Denial of Service for an application.

The OpenSSL HTTP client API functions can be used directly by applications but they are also used by the OCSP client functions and CMP (Certificate Management Protocol) client implementation in OpenSSL. However the URLs used by these implementations are unlikely to be controlled by an attacker.

In this vulnerable code the out of bounds read can only trigger a crash. Furthermore the vulnerability requires an attacker-controlled URL to be passed from an application to the OpenSSL function and the user has to have a ’no_proxy’ environment variable set. For the aforementioned reasons the issue was assessed as Low severity.

The vulnerable code was introduced in the following patch releases: 3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the HTTP client implementation is outside the OpenSSL FIPS module boundary.

CVE-2025-4575

Severity
Low
Published at
22 May 2025
Title
The x509 application adds trusted use instead of rejected use
Found by
Alexandr Sosedkin (Red Hat)
Fix developed by
Tomáš Mráz
Affected
  • from 3.5.0 before 3.5.1
References

Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate.

Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use.

A copy & paste error during minor refactoring of the code introduced this issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead.

Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue. The issues affecting only the command line application are considered to be Low severity.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.

OpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this issue.