
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-4432 is a vulnerability discovered in Rust's Ring cryptographic package, disclosed on March 5, 2025. The vulnerability involves a panic that may be triggered when overflow checking is enabled, specifically affecting the QUIC protocol implementation and AES encryption functions. The flaw was found in the ring::aead::quic::HeaderProtectionKey::new_mask() function and has been assigned a CVSS v3.1 Base Score of 5.3 (Medium) (NVD, Wiz).
The vulnerability occurs when overflow checking is enabled through RUSTFLAGS="-C overflow-checks" or overflow-checks = true in the Cargo.toml profile. On 64-bit targets, operations using ring::aead::{AES128GCM, AES256GCM} may panic when encrypting/decrypting approximately 68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. The issue manifests particularly in debug mode, where overflow checking is enabled by default (RustSec, Ring PR).
The vulnerability can lead to a denial of service condition through application panic. In the QUIC protocol, this flaw allows an attacker to induce a panic by sending a specially crafted packet. Even without malicious intent, the issue is likely to occur unintentionally in 1 out of every 2^32 packets sent or received. Notably, protocols like TLS and SSH are not affected as they break large amounts of data into small chunks (RustSec).
The vulnerability has been fixed in Ring version 0.17.12, released on March 6, 2025. The fix involves using wrapping addition instead of regular addition for counter operations. Users are advised to upgrade to version 0.17.12 or later to address this vulnerability (Ring Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."