CVE-2025-13470
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-13470 affects RNP version 0.18.0, where a refactoring regression causes the symmetric session key used for Public-Key Encrypted Session Key (PKESK) packets to be left uninitialized except for zeroing. The vulnerability was discovered on November 7, 2025, by Johannes Roth from MTG AG, and was publicly disclosed on November 21, 2025. The issue affects only public key encryption (PKESK packets), while passphrase-based encryption (SKESK packets) remains unaffected (Ribose Advisory, NVD).

Technical details

The vulnerability stems from a refactoring regression where the initialization logic inside encrypted_build_skesk() only randomized the key for the SKESK path and omitted it for the PKESK path. This was introduced in commit 7bd9a8dc356aae756b40755be76d36205b6b161a. The CVSS v3.1 base score is 7.5 (HIGH) with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, and CVSS v4.0 score is 7.7 (HIGH) with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/AU:Y/RE:H/U:Red (NVD).

Impact

Any data encrypted using public-key encryption in RNP version 0.18.0 can be decrypted trivially by supplying an all-zero session key, fully compromising confidentiality. The vulnerability affects standalone RNP 0.18.0 users and potentially some distribution-packaged Thunderbird installations that use system RNP 0.18.0 instead of the bundled version (Ribose Advisory).

Mitigation and workarounds

The vulnerability has been fixed in RNP version 0.18.1. Users who encrypted sensitive data using RNP 0.18.0 (standalone or via Thunderbird with system RNP 0.18.0) should consider re-encrypting that data with RNP 0.18.1 or 0.17.1 based on their security requirements and threat model. RNP versions 0.17.1 and earlier are not affected by this vulnerability (Ribose Advisory, GitHub Release).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13470HIGH7.7
  • Linux DebianLinux Debian
  • rnp
NoYesNov 21, 2025
CVE-2025-62626HIGH7.2
  • EchoEcho
  • libertas-sd8686-firmware
NoYesNov 21, 2025
CVE-2025-40211N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-modules-internal
NoYesNov 21, 2025
CVE-2025-40210N/AN/A
  • EchoEcho
  • linux
NoYesNov 21, 2025
CVE-2025-40209N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesNov 21, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management