Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
Typeapk
Namespacealpine
Namembedtls
Version3.6.4-r0
Qualifiers
arch riscv64
distroversion v3.20
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.6.5-r0
Latest_non_vulnerable_version3.6.6-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7ppw-f9jy-k7ae
vulnerability_id VCID-7ppw-f9jy-k7ae
summary Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-52497
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25899
published_at 2026-04-18T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.26008
published_at 2026-04-09T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.26018
published_at 2026-04-11T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25918
published_at 2026-04-16T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.26081
published_at 2026-04-02T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.26121
published_at 2026-04-04T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25887
published_at 2026-04-07T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25957
published_at 2026-04-08T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26249
published_at 2026-04-13T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26308
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-52497
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52497
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108786
reference_id 1108786
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108786
3
reference_url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-2.md
reference_id mbedtls-security-advisory-2025-06-2.md
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:18:40Z/
url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-2.md
4
reference_url https://usn.ubuntu.com/8123-1/
reference_id USN-8123-1
reference_type
scores
url https://usn.ubuntu.com/8123-1/
fixed_packages
0
url pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mbedtls@3.6.4-r0%3Farch=riscv64&distroversion=v3.20&reponame=main
aliases CVE-2025-52497
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ppw-f9jy-k7ae
1
url VCID-7v3a-5q44-cucz
vulnerability_id VCID-7v3a-5q44-cucz
summary Mbed TLS before 3.6.4 has a NULL pointer dereference because mbedtls_asn1_store_named_data can trigger conflicting data with val.p of NULL but val.len greater than zero.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-48965
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09613
published_at 2026-04-04T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09562
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13755
published_at 2026-04-08T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13673
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13806
published_at 2026-04-09T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13774
published_at 2026-04-11T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13737
published_at 2026-04-12T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13688
published_at 2026-04-13T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18643
published_at 2026-04-16T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18655
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-48965
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48965
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108790
reference_id 1108790
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108790
3
reference_url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-6.md
reference_id mbedtls-security-advisory-2025-06-6.md
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-23T14:32:31Z/
url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-6.md
4
reference_url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-23T14:32:31Z/
url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
5
reference_url https://usn.ubuntu.com/8123-1/
reference_id USN-8123-1
reference_type
scores
url https://usn.ubuntu.com/8123-1/
fixed_packages
0
url pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mbedtls@3.6.4-r0%3Farch=riscv64&distroversion=v3.20&reponame=main
aliases CVE-2025-48965
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7v3a-5q44-cucz
2
url VCID-98cg-wuhp-qudq
vulnerability_id VCID-98cg-wuhp-qudq
summary Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, which performs a deep free(). As a result, application code that uses this function (relying only on documented behavior) is likely to still hold pointers to the memory blocks that were freed, resulting in a high risk of use-after-free or double-free. In particular, the two sample programs x509/cert_write and x509/cert_req are affected (use-after-free if the san string contains more than one DN).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47917
reference_id
reference_type
scores
0
value 0.0361
scoring_system epss
scoring_elements 0.87753
published_at 2026-04-04T12:55:00Z
1
value 0.0361
scoring_system epss
scoring_elements 0.87739
published_at 2026-04-02T12:55:00Z
2
value 0.04351
scoring_system epss
scoring_elements 0.88959
published_at 2026-04-18T12:55:00Z
3
value 0.04351
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-11T12:55:00Z
4
value 0.04351
scoring_system epss
scoring_elements 0.88949
published_at 2026-04-12T12:55:00Z
5
value 0.04351
scoring_system epss
scoring_elements 0.88948
published_at 2026-04-13T12:55:00Z
6
value 0.04351
scoring_system epss
scoring_elements 0.88961
published_at 2026-04-16T12:55:00Z
7
value 0.04351
scoring_system epss
scoring_elements 0.8892
published_at 2026-04-07T12:55:00Z
8
value 0.04351
scoring_system epss
scoring_elements 0.88938
published_at 2026-04-08T12:55:00Z
9
value 0.04351
scoring_system epss
scoring_elements 0.88943
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47917
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47917
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108791
reference_id 1108791
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108791
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/52427.c
reference_id CVE-2025-47917
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/52427.c
4
reference_url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md
reference_id mbedtls-security-advisory-2025-06-7.md
reference_type
scores
0
value 8.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-22T14:22:32Z/
url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md
5
reference_url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 8.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-22T14:22:32Z/
url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
6
reference_url https://usn.ubuntu.com/8123-1/
reference_id USN-8123-1
reference_type
scores
url https://usn.ubuntu.com/8123-1/
fixed_packages
0
url pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mbedtls@3.6.4-r0%3Farch=riscv64&distroversion=v3.20&reponame=main
aliases CVE-2025-47917
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-98cg-wuhp-qudq
3
url VCID-xa5h-khas-8ybs
vulnerability_id VCID-xa5h-khas-8ybs
summary In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in mbedtls_lms_verify allow an attacker (who can induce a hardware hash accelerator fault) to bypass LMS signature verification by reusing stale stack data, resulting in acceptance of an invalid signature. In mbedtls_lms_verify, the return values of the internal Merkle tree functions create_merkle_leaf_value and create_merkle_internal_value are not checked. These functions return an integer that indicates whether the call succeeded or not. If a failure occurs, the output buffer (Tc_candidate_root_node) may remain uninitialized, and the result of the signature verification is unpredictable. When the software implementation of SHA-256 is used, these functions will not fail. However, with hardware-accelerated hashing, an attacker could use fault injection against the accelerator to bypass verification.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49600
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02335
published_at 2026-04-18T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02329
published_at 2026-04-16T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02348
published_at 2026-04-02T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02359
published_at 2026-04-04T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02356
published_at 2026-04-07T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.0236
published_at 2026-04-08T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02381
published_at 2026-04-09T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02358
published_at 2026-04-11T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02346
published_at 2026-04-12T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02345
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49600
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108787
reference_id 1108787
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108787
2
reference_url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-3.md
reference_id mbedtls-security-advisory-2025-06-3.md
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:18:22Z/
url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-3.md
fixed_packages
0
url pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mbedtls@3.6.4-r0%3Farch=riscv64&distroversion=v3.20&reponame=main
aliases CVE-2025-49600
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xa5h-khas-8ybs
4
url VCID-yjdu-ervm-3bcn
vulnerability_id VCID-yjdu-ervm-3bcn
summary In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49087
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19178
published_at 2026-04-04T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19126
published_at 2026-04-02T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.2814
published_at 2026-04-08T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28074
published_at 2026-04-07T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28183
published_at 2026-04-09T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28191
published_at 2026-04-11T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28456
published_at 2026-04-13T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28505
published_at 2026-04-12T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33342
published_at 2026-04-16T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33319
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49087
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108789
reference_id 1108789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108789
2
reference_url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-5.md
reference_id mbedtls-security-advisory-2025-06-5.md
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-21T18:13:55Z/
url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-5.md
3
reference_url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-21T18:13:55Z/
url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
fixed_packages
0
url pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mbedtls@3.6.4-r0%3Farch=riscv64&distroversion=v3.20&reponame=main
aliases CVE-2025-49087
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yjdu-ervm-3bcn
5
url VCID-ysr1-padp-a3ff
vulnerability_id VCID-ysr1-padp-a3ff
summary In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49601
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20046
published_at 2026-04-18T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20042
published_at 2026-04-16T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20218
published_at 2026-04-02T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20275
published_at 2026-04-04T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.19999
published_at 2026-04-07T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.2008
published_at 2026-04-08T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20137
published_at 2026-04-09T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20163
published_at 2026-04-11T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20118
published_at 2026-04-12T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.2006
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49601
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108788
reference_id 1108788
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108788
2
reference_url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-4.md
reference_id mbedtls-security-advisory-2025-06-4.md
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:17:24Z/
url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-4.md
fixed_packages
0
url pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mbedtls@3.6.4-r0%3Farch=riscv64&distroversion=v3.20&reponame=main
aliases CVE-2025-49601
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysr1-padp-a3ff
6
url VCID-zpq1-dwvf-8ka2
vulnerability_id VCID-zpq1-dwvf-8ka2
summary Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-52496
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09086
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.0917
published_at 2026-04-11T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09375
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.0936
published_at 2026-04-13T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09139
published_at 2026-04-08T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09059
published_at 2026-04-07T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11293
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-52496
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52496
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108785
reference_id 1108785
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108785
3
reference_url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-1.md
reference_id mbedtls-security-advisory-2025-06-1.md
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-07-08T14:07:04Z/
url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-1.md
4
reference_url https://usn.ubuntu.com/8123-1/
reference_id USN-8123-1
reference_type
scores
url https://usn.ubuntu.com/8123-1/
fixed_packages
0
url pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/mbedtls@3.6.4-r0?arch=riscv64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mbedtls@3.6.4-r0%3Farch=riscv64&distroversion=v3.20&reponame=main
aliases CVE-2025-52496
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zpq1-dwvf-8ka2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/mbedtls@3.6.4-r0%3Farch=riscv64&distroversion=v3.20&reponame=main