Search for vulnerabilities
Vulnerability ID | VCID-pfcg-gq38-4yf5 |
Aliases |
CVE-2025-4575
|
Summary | Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use. A copy & paste error during minor refactoring of the code introduced this issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead. Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue. The issues affecting only the command line application are considered to be Low severity. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this issue. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 5.9 |
Risk | 3.0 |
Affected and Fixed Packages | Package Details |
CWE-295 | Improper Certificate Validation |
Reference id | Reference type | URL |
---|---|---|
https://api.first.org/data/v1/epss?cve=CVE-2025-4575 | ||
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml | ||
http://www.openwall.com/lists/oss-security/2025/05/22/1 | ||
1106322 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106322 | |
20250522.txt | https://openssl-library.org/news/secadv/20250522.txt | |
AVG-2882 | https://security.archlinux.org/AVG-2882 | |
CVE-2025-4575 | https://nvd.nist.gov/vuln/detail/CVE-2025-4575 | |
e96d22446e633d117e6c9904cb15b4693e956eaa | https://github.com/openssl/openssl/commit/e96d22446e633d117e6c9904cb15b4693e956eaa |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.03765 |
EPSS Score | 0.0002 |
Published At | May 23, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-05-22T20:09:01.681430+00:00 | Debian Importer | Import | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |