Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-69421
PUBLISHED
More InfoOfficial Page
Assigner-openssl
Assigner Org ID-3a12439a-ef3a-4c79-92e6-6081a721f1e5
View Known Exploited Vulnerability (KEV) details
Published At-27 Jan, 2026 | 16:01
Updated At-28 Jan, 2026 | 15:19
Rejected At-
▼CVE Numbering Authority (CNA)
NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function

Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When called from PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can be NULL, causing a crash. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. Exploiting this issue requires an attacker to provide a malformed PKCS#12 file to an application that processes it. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.

Affected Products
Vendor
OpenSSLOpenSSL
Product
OpenSSL
Default Status
unaffected
Versions
Affected
  • From 3.6.0 before 3.6.1 (semver)
  • From 3.5.0 before 3.5.5 (semver)
  • From 3.4.0 before 3.4.4 (semver)
  • From 3.3.0 before 3.3.6 (semver)
  • From 3.0.0 before 3.0.19 (semver)
  • From 1.1.1 before 1.1.1ze (custom)
  • From 1.0.2 before 1.0.2zn (custom)
Problem Types
TypeCWE IDDescription
CWECWE-476CWE-476 NULL Pointer Dereference
Type: CWE
CWE ID: CWE-476
Description: CWE-476 NULL Pointer Dereference
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
https://openssl-library.org/policies/general/security-policy/
text:
Low
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Luigino Camastra (Aisle Research)
remediation developer
Luigino Camastra (Aisle Research)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://openssl-library.org/news/secadv/20260127.txt
vendor-advisory
https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c
patch
https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b
patch
https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3
patch
https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd
patch
https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7
patch
Hyperlink: https://openssl-library.org/news/secadv/20260127.txt
Resource:
vendor-advisory
Hyperlink: https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c
Resource:
patch
Hyperlink: https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b
Resource:
patch
Hyperlink: https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3
Resource:
patch
Hyperlink: https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd
Resource:
patch
Hyperlink: https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7
Resource:
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found