Staging Environment: Content and features may be unstable or change without notice.
Advisory details: vulnrichment_importer_v2 / CVE-2025-11187
Advisory ID vulnrichment_importer_v2/CVE-2025-11187
Aliases
Summary Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For this reason the issue was assessed as Moderate severity. The FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as PKCS#12 processing is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue. OpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do not support PBMAC1 in PKCS#12.
Status Published
Exploitability
Weighted Severity
Risk
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3.1 6.1
ssvc Track*
Reference id Reference type URL
20260127.txt Advisory https://openssl-library.org/news/secadv/20260127.txt
205e3a55e16e4bd08c12fdbd3416ab829c0f6206 Other https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206
8caf359d6e46fb413e8f5f0df765d2e8a51df4e8 Other https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8
e1079bc17ed93ff16f6b86f33a2fe3336e78817e Other https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.00518
EPSS Score 7e-05
Published At April 1, 2026, 12:55 p.m.
Source https://epss.cyentia.com/epss_scores-current.csv.gz
Advisory epss_importer_v2/CVE-2025-11187
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H Found at None
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-03-20T03:55:43Z/ Found at None

There are no SSVC decisions available.