Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-7071

Summary
Assigner-NCSC.ch
Assigner Org ID-455daabc-a392-441d-aa46-37d35189897c
Published At-29 Aug, 2025 | 09:18
Updated At-29 Aug, 2025 | 12:07
Rejected At-
Credits

Timing side-channel vulnerability in AES-CBC decryption with PKCS#7 padding in ocrypto library

Padding oracle attack vulnerability in Oberon microsystem AG’s ocrypto library in all versions since 3.1.0 and prior to 3.9.2 allows an attacker to recover plaintexts via timing measurements of AES-CBC PKCS#7 decrypt operations.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:NCSC.ch
Assigner Org ID:455daabc-a392-441d-aa46-37d35189897c
Published At:29 Aug, 2025 | 09:18
Updated At:29 Aug, 2025 | 12:07
Rejected At:
▼CVE Numbering Authority (CNA)
Timing side-channel vulnerability in AES-CBC decryption with PKCS#7 padding in ocrypto library

Padding oracle attack vulnerability in Oberon microsystem AG’s ocrypto library in all versions since 3.1.0 and prior to 3.9.2 allows an attacker to recover plaintexts via timing measurements of AES-CBC PKCS#7 decrypt operations.

Affected Products
Vendor
Oberon microsystems AG
Product
ocrypto
Modules
  • AES-CBC with PKCS#7 padding
Default Status
unaffected
Versions
Affected
  • From 3.1.0 through 3.9.1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-208CWE-208 Observable Timing Discrepancy
CWECWE-327CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Type: CWE
CWE ID: CWE-208
Description: CWE-208 Observable Timing Discrepancy
Type: CWE
CWE ID: CWE-327
Description: CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Metrics
VersionBase scoreBase severityVector
4.05.9MEDIUM
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Version: 4.0
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-463CAPEC-463 Padding Oracle Crypto Attack
CAPEC ID: CAPEC-463
Description: CAPEC-463 Padding Oracle Crypto Attack
Solutions

Affected users should upgrade to ocrypto 3.9.2 or later.

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.oberon.ch/security-advisories/cve-2025-7071/
N/A
Hyperlink: https://www.oberon.ch/security-advisories/cve-2025-7071/
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:vulnerability@ncsc.ch
Published At:29 Aug, 2025 | 10:15
Updated At:29 Aug, 2025 | 16:24

Padding oracle attack vulnerability in Oberon microsystem AG’s ocrypto library in all versions since 3.1.0 and prior to 3.9.2 allows an attacker to recover plaintexts via timing measurements of AES-CBC PKCS#7 decrypt operations.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.05.9MEDIUM
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-208Secondaryvulnerability@ncsc.ch
CWE-327Secondaryvulnerability@ncsc.ch
CWE ID: CWE-208
Type: Secondary
Source: vulnerability@ncsc.ch
CWE ID: CWE-327
Type: Secondary
Source: vulnerability@ncsc.ch
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.oberon.ch/security-advisories/cve-2025-7071/vulnerability@ncsc.ch
N/A
Hyperlink: https://www.oberon.ch/security-advisories/cve-2025-7071/
Source: vulnerability@ncsc.ch
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1Records found

CVE-2025-7383
Matching Score-10
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Matching Score-10
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-5.9||MEDIUM
EPSS-Not Assigned
Published-29 Aug, 2025 | 09:19
Updated-29 Aug, 2025 | 16:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timing side-channel vulnerability in AES-CBC decryption with PKCS#7 padding in Oberon PSA Crypto library

Padding oracle attack vulnerability in Oberon microsystem AG’s Oberon PSA Crypto library in all versions since 1.0.0 and prior to 1.5.1 allows an attacker to recover plaintexts via timing measurements of AES-CBC PKCS#7 decrypt operations.

Action-Not Available
Vendor-Oberon microsystems AG
Product-Oberon PSA Crypto
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Details not found