Search for vulnerabilities
Vulnerability details: VCID-56qx-e3h3-2kbr
Vulnerability ID VCID-56qx-e3h3-2kbr
Aliases CVE-2025-24970
GHSA-4g8c-wm8x-jfhw
Summary SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine ### Impact When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. ### Workarounds As workaround its possible to either disable the usage of the native SSLEngine or changing the code from: ``` SslContext context = ...; SslHandler handler = context.newHandler(....); ``` to: ``` SslContext context = ...; SSLEngine engine = context.newEngine(....); SslHandler handler = new SslHandler(engine, ....); ```
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24970.json
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2025-24970
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-4g8c-wm8x-jfhw
cvssv3.1 7.5 https://github.com/netty/netty
generic_textual HIGH https://github.com/netty/netty
cvssv3.1 7.5 https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4
generic_textual HIGH https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4
ssvc Track https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4
cvssv3.1 7.5 https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw
cvssv3.1_qr HIGH https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw
generic_textual HIGH https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw
ssvc Track https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2025-24970
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2025-24970
cvssv3.1 7.5 https://security.netapp.com/advisory/ntap-20250221-0005
generic_textual HIGH https://security.netapp.com/advisory/ntap-20250221-0005
cvssv3.1 7.5 https://www.vicarius.io/vsociety/posts/cve-2025-24970-netty-vulnerability-detection
generic_textual HIGH https://www.vicarius.io/vsociety/posts/cve-2025-24970-netty-vulnerability-detection
cvssv3.1 7.5 https://www.vicarius.io/vsociety/posts/cve-2025-24970-netty-vulnerability-mitigation
generic_textual HIGH https://www.vicarius.io/vsociety/posts/cve-2025-24970-netty-vulnerability-mitigation
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24970.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/netty/netty
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:30:54Z/ Found at https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:30:54Z/ Found at https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2025-24970
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.netapp.com/advisory/ntap-20250221-0005
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.vicarius.io/vsociety/posts/cve-2025-24970-netty-vulnerability-detection
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.vicarius.io/vsociety/posts/cve-2025-24970-netty-vulnerability-mitigation
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.2629
EPSS Score 0.00088
Published At July 16, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-01T12:12:30.600150+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-4g8c-wm8x-jfhw/GHSA-4g8c-wm8x-jfhw.json 36.1.3