Skip to content

Commit f17a267

Browse files
committed
post: fixes for CVE-2025-15467
1 parent d67b496 commit f17a267

File tree

1 file changed

+20
-5
lines changed

1 file changed

+20
-5
lines changed

post/potential-rce-vulnerabilityin-openssl-cve-2025-15467.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,14 +26,29 @@ FIPS modules in 3.6, 3.5, 3.4, 3.3, and 3.0 are not affected, as the CMS impleme
2626

2727
## Reproducing CVE-2025-15467
2828

29-
**Our research team has managed to reproduce the vulnerability** by calling the [**CMS\_Decrypt**](https://docs.openssl.org/3.2/man3/CMS_decrypt/) API directly, which means that OpenSSL applications that directly call this API are vulnerable to CVE-2025-15467.
29+
**Our research team has managed to reproduce the vulnerability** by calling the [**CMS\_Decrypt**](https://docs.openssl.org/3.2/man3/CMS_decrypt/) API directly -
3030
![](/img/RealTimePostImage/post/openssl/image2.png)
3131

32-
Exploitation can also be achieved when applications are using the `openssl cms` CLI tool to decrypt untrusted data:
3332

34-
```shell
35-
openssl cms -decrypt -in untrusted_data.pem
36-
```
33+
34+
We have observed the following cases to be vulnerable to CVE-2025-15467 -
35+
36+
A. OpenSSL-based applications that call any of the following APIs -
37+
38+
* `CMS_RecipientInfo_decrypt`
39+
* `CMS_decrypt_set1_pkey_and_peer`
40+
* `CMS_decrypt_set1_pkey`
41+
* `CMS_decrypt`
42+
* `PKCS7_decrypt`
43+
* `CMS_EnvelopedData_decrypt`
44+
45+
46+
47+
B. Applications that invoke any of the following OpenSSL tools -
48+
* `openssl cms`
49+
* `openssl smime`
50+
51+
3752

3853
Note that this is only an initial assessment and more attack vectors are likely to be relevant, stay tuned as we update this blog.
3954

0 commit comments

Comments
 (0)