Search for vulnerabilities
Vulnerability details: VCID-qqpq-7rfp-r7cj
Vulnerability ID VCID-qqpq-7rfp-r7cj
Aliases CVE-2025-47917
Summary Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, which performs a deep free(). As a result, application code that uses this function (relying only on documented behavior) is likely to still hold pointers to the memory blocks that were freed, resulting in a high risk of use-after-free or double-free. In particular, the two sample programs x509/cert_write and x509/cert_req are affected (use-after-free if the san string contains more than one DN).
Status Published
Exploitability 2.0
Weighted Severity 8.8
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.02127 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.02127 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.02127 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.02127 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
epss 0.02127 https://api.first.org/data/v1/epss?cve=CVE-2025-47917
cvssv3.1 8.9 https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md
ssvc Track https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md
cvssv3.1 8.9 https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
ssvc Track https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2025-47917
Data source Exploit-DB
Date added Sept. 16, 2025
Description Mbed TLS 3.6.4 - Use-After-Free
Ransomware campaign use Unknown
Source publication date Sept. 16, 2025
Exploit type local
Platform multiple
Source update date Sept. 16, 2025
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H Found at https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-22T14:22:32Z/ Found at https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H Found at https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-22T14:22:32Z/ Found at https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2025-47917
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.15357
EPSS Score 0.0005
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:34:18.024098+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/v3.22/main.json 37.0.0