Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-30334

Summary
Assigner-cisa-cg
Assigner Org ID-9119a7d8-5eab-497f-8521-727c672e3725
Published At-20 Mar, 2025 | 20:39
Updated At-21 Mar, 2025 | 15:22
Rejected At-
Credits

OpenBSD wg(4) kernel crash

In OpenBSD 7.6 before errata 006 and OpenBSD 7.5 before errata 015, traffic sent over wg(4) could result in kernel crash.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisa-cg
Assigner Org ID:9119a7d8-5eab-497f-8521-727c672e3725
Published At:20 Mar, 2025 | 20:39
Updated At:21 Mar, 2025 | 15:22
Rejected At:
▼CVE Numbering Authority (CNA)
OpenBSD wg(4) kernel crash

In OpenBSD 7.6 before errata 006 and OpenBSD 7.5 before errata 015, traffic sent over wg(4) could result in kernel crash.

Affected Products
Vendor
OpenBSDOpenBSD
Product
OpenBSD
Default Status
unknown
Versions
Affected
  • From 7.6 before 7.6 errata 006 (custom)
  • From 7.5 before 7.5 errata 015 (custom)
Unaffected
  • 7.6 errata 008
  • 7.5 errata 015
Problem Types
TypeCWE IDDescription
CWECWE-131CWE-131 Incorrect Calculation of Buffer Size
Type: CWE
CWE ID: CWE-131
Description: CWE-131 Incorrect Calculation of Buffer Size
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.07.1HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 4.0
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/006_wg.patch.sig
N/A
https://ftp.openbsd.org/pub/OpenBSD/patches/7.5/common/015_wg.patch.sig
N/A
https://github.com/openbsd/src/commit/c06199859734d958552a581d72b4c0f910e68d7c
N/A
Hyperlink: https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/006_wg.patch.sig
Resource: N/A
Hyperlink: https://ftp.openbsd.org/pub/OpenBSD/patches/7.5/common/015_wg.patch.sig
Resource: N/A
Hyperlink: https://github.com/openbsd/src/commit/c06199859734d958552a581d72b4c0f910e68d7c
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:9119a7d8-5eab-497f-8521-727c672e3725
Published At:20 Mar, 2025 | 21:15
Updated At:20 Mar, 2025 | 22:15

In OpenBSD 7.6 before errata 006 and OpenBSD 7.5 before errata 015, traffic sent over wg(4) could result in kernel crash.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.1HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 4.0
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-131Secondary9119a7d8-5eab-497f-8521-727c672e3725
CWE ID: CWE-131
Type: Secondary
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://ftp.openbsd.org/pub/OpenBSD/patches/7.5/common/015_wg.patch.sig9119a7d8-5eab-497f-8521-727c672e3725
N/A
https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/006_wg.patch.sig9119a7d8-5eab-497f-8521-727c672e3725
N/A
https://github.com/openbsd/src/commit/c06199859734d958552a581d72b4c0f910e68d7c9119a7d8-5eab-497f-8521-727c672e3725
N/A
Hyperlink: https://ftp.openbsd.org/pub/OpenBSD/patches/7.5/common/015_wg.patch.sig
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Resource: N/A
Hyperlink: https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/006_wg.patch.sig
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Resource: N/A
Hyperlink: https://github.com/openbsd/src/commit/c06199859734d958552a581d72b4c0f910e68d7c
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

2Records found

CVE-2023-52557
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.26%
||
7 Day CHG~0.00%
Published-01 Mar, 2024 | 16:14
Updated-02 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD 7.3 invalid l2tp message npppd crash

In OpenBSD 7.3 before errata 016, npppd(8) could crash by a l2tp message which has an AVP (Attribute-Value Pair) with wrong length.

Action-Not Available
Vendor-OpenBSD
Product-OpenBSDopenbsd
CWE ID-CWE-805
Buffer Access with Incorrect Length Value
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2023-52558
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-7.5||HIGH
EPSS-0.07% / 23.20%
||
7 Day CHG~0.00%
Published-01 Mar, 2024 | 16:33
Updated-19 Nov, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD 7.4 and 7.3 m_split() network buffer kernel crash

In OpenBSD 7.4 before errata 002 and OpenBSD 7.3 before errata 019, a network buffer that had to be split at certain length that could crash the kernel after receiving specially crafted escape sequences.

Action-Not Available
Vendor-OpenBSD
Product-OpenBSDopenbsd
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
Details not found