CVE-2025-61725
cAdvisor Schwachstellenanalyse und -minderung

Überblick

CVE-2025-61725 is a security vulnerability discovered in Go's net/mail package, specifically affecting the ParseAddress function. The vulnerability was discovered by Philippe Antoine (Catena cyber) and was publicly disclosed on October 29, 2025. The issue affects multiple versions of Go, including versions before 1.24.8 and from 1.25.0 before 1.25.2 (Go Project, NVD).

Technische Details

The vulnerability stems from the ParseAddress function's implementation, which constructs domain-literal address components through repeated string concatenation. This design flaw can lead to excessive CPU consumption when parsing large domain-literal components. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).

Aufprall

The primary impact of this vulnerability is on system availability. When processing large domain-literal components, the affected function can cause excessive CPU consumption, potentially leading to denial of service conditions. This affects any applications that use the Go net/mail package for parsing email addresses (Go Project).

Risikominderung und Problemumgehungen

The vulnerability has been fixed in Go versions 1.24.8 and 1.25.2. Users are advised to upgrade to these patched versions. The fix was implemented through code changes that address the string concatenation issue in the ParseAddress function (Go Project).

Reaktionen der Community

The Go team promptly addressed the vulnerability as part of a security release that included fixes for multiple security issues. The vulnerability was treated as a high-priority security issue, as evidenced by its inclusion in a dedicated security release (Go Project).

Zusätzliche Ressourcen


QuelleDieser Bericht wurde mithilfe von KI erstellt

Verwandt cAdvisor Schwachstellen:

CVE-Kennung

Strenge

Punktzahl

Technologieen

Name der Komponente

CISA KEV-Exploit

Hat fix

Veröffentlichungsdatum

CVE-2025-61725HIGH7.5
  • cAdvisorcAdvisor
  • falcoctl-fips
NeinJaOct 29, 2025
CVE-2025-61723HIGH7.5
  • cAdvisorcAdvisor
  • kafka-proxy
NeinJaOct 29, 2025
CVE-2025-58188HIGH7.5
  • cAdvisorcAdvisor
  • kyverno-1.13
NeinJaOct 29, 2025
CVE-2025-61724MEDIUM5.3
  • cAdvisorcAdvisor
  • thanos-operator-fips
NeinJaOct 29, 2025
CVE-2025-58189MEDIUM5.3
  • cAdvisorcAdvisor
  • prometheus-elasticsearch-exporter
NeinJaOct 29, 2025

Kostenlose Schwachstellenbewertung

Benchmarking Ihrer Cloud-Sicherheitslage

Bewerten Sie Ihre Cloud-Sicherheitspraktiken in 9 Sicherheitsbereichen, um Ihr Risikoniveau zu bewerten und Lücken in Ihren Abwehrmaßnahmen zu identifizieren.

Bewertung anfordern

Eine personalisierte Demo anfordern

Sind Sie bereit, Wiz in Aktion zu sehen?

"Die beste Benutzererfahrung, die ich je gesehen habe, bietet vollständige Transparenz für Cloud-Workloads."
David EstlickCISO
"„Wiz bietet eine zentrale Oberfläche, um zu sehen, was in unseren Cloud-Umgebungen vor sich geht.“ "
Adam FletcherSicherheitsbeauftragter
"„Wir wissen, dass, wenn Wiz etwas als kritisch identifiziert, es auch tatsächlich ist.“"
Greg PoniatowskiLeiter Bedrohungs- und Schwachstellenmanagement