
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-9232 is an out-of-bounds read vulnerability discovered in OpenSSL's HTTP client API, disclosed on September 30, 2025. The vulnerability affects OpenSSL versions 3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0, and 3.5.0, where an application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the 'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address. The issue was discovered by Stanislav Fort from Aisle Research and has been assigned a Low severity rating (OpenSSL Advisory).
The vulnerability is classified as an out-of-bounds read (CWE-125) that occurs specifically when processing HTTP requests with IPv6 addresses while the 'no_proxy' environment variable is set. The issue affects the HTTP client implementation in OpenSSL, which is used both directly by applications and by the OCSP client functions and CMP (Certificate Management Protocol) client implementation. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.9 MEDIUM (Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) (NVD).
The primary impact of this vulnerability is the potential for a Denial of Service (DoS) condition through application crashes. The out-of-bounds read can trigger a crash which leads to Denial of Service for an application. However, the impact is limited as the vulnerability requires specific conditions: an attacker-controlled URL must be passed from an application to the OpenSSL function, and the user must have a 'no_proxy' environment variable set (OpenSSL Advisory).
The recommended mitigation is to upgrade to the fixed versions of OpenSSL. OpenSSL 3.5 users should upgrade to OpenSSL 3.5.4, OpenSSL 3.4 users to 3.4.3, OpenSSL 3.3 users to 3.3.5, OpenSSL 3.2 users to 3.2.6, and OpenSSL 3.0 users to 3.0.18. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1, and 3.0 are not affected by this issue, as the HTTP client implementation is outside the OpenSSL FIPS module boundary (OpenSSL Advisory).
Multiple Linux distributions have responded to this vulnerability by releasing security updates. Ubuntu has issued security notices (USN-7786-1) addressing this vulnerability across multiple versions of their operating system, including Ubuntu 25.04, 24.04 LTS, 22.04 LTS, and others (Ubuntu Notice). Debian has also released security updates (DSA 6015-1) to address this vulnerability in their distributions (Debian Notice).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."