CVE-2025-64429
DuckDB vulnerability analysis and mitigation

Overview

CVE-2025-64429 is a security vulnerability discovered in DuckDB's database encryption implementation, affecting versions 1.4.0 and above, and patched in version 1.4.2. The vulnerability was disclosed on November 12, 2025. The issue involves multiple weaknesses in the cryptographic implementation, including the potential use of an insecure random number generator, improper memory clearing of encryption keys, possible encryption downgrade attacks, and inadequate validation of cryptographic operations (DuckDB Advisory).

Technical details

The vulnerability comprises four distinct technical issues: 1) The use of pcg32, a non-cryptographically secure random number generator with only 127 bits of internal state, for generating cryptographic keys and IVs when using the Mbed TLS implementation. 2) Usage of std::memset() for clearing cryptographic keys from memory, which could be optimized out by compilers, leaving sensitive data exposed. 3) A design flaw allowing attackers to modify database headers to downgrade encryption from GCM (with integrity checks) to CTR mode. 4) Failure to verify the return value of OpenSSL's rand_bytes() function, potentially leading to deterministic values for IVs and keys (DuckDB Advisory).

Impact

The vulnerability could allow attackers to: 1) Compromise the internal state of the random number generator using public IVs to determine encryption keys for temporary files, 2) Access cryptographic keys through process memory if a memory leak exists, 3) Bypass GCM integrity checks through encryption downgrade attacks, and 4) Potentially influence the OpenSSL random number generator without detection, leading to predictable keys (DuckDB Advisory).

Mitigation and workarounds

DuckDB has addressed these vulnerabilities in version 1.4.2 through several measures: 1) Disabling the insecure random number generator and requiring OpenSSL implementation through the httpfs extension, 2) Implementing secure MbedTLS primitive for memory clearing, 3) Requiring explicit specification of ciphers without integrity checks, and 4) Adding proper return value checking for cryptographic operations (DuckDB Advisory).

Additional resources


SourceThis report was generated using AI

Related DuckDB vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59037HIGH8.6
  • JavaScriptJavaScript
  • @duckdb/node-bindings
NoYesSep 09, 2025
CVE-2024-41672HIGH7.5
  • DuckDBDuckDB
  • duckdb
NoYesJul 24, 2024
CVE-2025-64429MEDIUM6.9
  • DuckDBDuckDB
  • duckdb
NoYesNov 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management