CVE-2025-9230
OpenSSL vulnerability analysis and mitigation

Overview

CVE-2025-9230 is a vulnerability in OpenSSL's CMS message decryption functionality discovered on September 30, 2025. The vulnerability affects OpenSSL versions 3.5, 3.4, 3.3, 3.2, 3.0, 1.1.1, and 1.0.2, specifically in applications attempting to decrypt CMS messages encrypted using password-based encryption. This security flaw was reported by Stanislav Fort from Aisle Research and has been assigned a CVSS 3.1 base score of 7.5 (High) (NVD, OpenSSL Advisory).

Technical details

The vulnerability stems from an incorrect check of unwrapped key size in the kekunwrapkey() function, where the check is off by 8 bytes. This implementation flaw can trigger both an out-of-bounds read of up to 8 bytes and an out-of-bounds write of up to 4 bytes when processing password-based encrypted CMS messages. The issue has been identified with CWE-125 (Out-of-bounds Read) and CWE-787 (Out-of-bounds Write) classifications. The vulnerability specifically affects the CMS implementation outside the OpenSSL FIPS module boundary (OpenSSL Advisory, OpenSSL Commit).

Impact

The vulnerability can lead to multiple severe consequences. The out-of-bounds read may trigger a crash resulting in a Denial of Service (DoS) for affected applications. More critically, the out-of-bounds write can cause memory corruption, potentially leading to either Denial of Service or execution of attacker-supplied code. However, the probability of successful exploitation is considered low, particularly since password-based (PWRI) encryption support in CMS messages is rarely used (OpenSSL Advisory).

Mitigation and workarounds

OpenSSL has released patched versions to address this vulnerability. Users are advised to upgrade to the following versions based on their current installation: OpenSSL 3.5 users should upgrade to 3.5.4, 3.4 users to 3.4.3, 3.3 users to 3.3.5, 3.2 users to 3.2.6, 3.0 users to 3.0.18, 1.1.1 users to 1.1.1zd (premium support customers only), and 1.0.2 users to 1.0.2zm (premium support customers only). Ubuntu has also released security updates across multiple versions to address this vulnerability (OpenSSL Advisory, Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Related OpenSSL vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-53159CRITICAL9.1
  • RustRust
  • openssl
NoYesJul 28, 2025
CVE-2025-9230HIGH7.5
  • OpenSSLOpenSSL
  • cpe:2.3:a:openssl:openssl
NoYesSep 30, 2025
CVE-2025-9231MEDIUM6.5
  • OpenSSLOpenSSL
  • openssl
NoYesSep 30, 2025
CVE-2025-9232MEDIUM5.9
  • OpenSSLOpenSSL
  • openssl
NoYesSep 30, 2025
CVE-2025-27587MEDIUM5.3
  • OpenSSLOpenSSL
  • libopenssl3
NoYesJun 16, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management