Vulnerability DatabaseGHSA-f5v5-ccqc-6w36

GHSA-f5v5-ccqc-6w36
Rust vulnerability analysis and mitigation

Overview

The NATS official Rust clients (async-nats package) were found vulnerable to Man-in-the-Middle (MitM) attacks when using TLS. The vulnerability was discovered and reported on March 24, 2023, and affects versions prior to 0.29.0. The issue lies in the TLS certificate common name validation process, where the certificate's common name is validated against the hostname provided by the server's plaintext INFO message during the initial connection setup phase (RustSec Advisory, GitHub Advisory).

Technical details

The vulnerability stems from the way the TLS certificate validation is performed. During the connection setup, the client validates the server's TLS certificate common name against a hostname received in a plaintext INFO message. This implementation flaw allows a malicious proxy to manipulate the host field value in the INFO message, substituting it with the common name of a valid certificate under their control. The rustls library then accepts this certificate after verifying that the common name matches the attacker-controlled value (RustSec Advisory).

Impact

The vulnerability enables Man-in-the-Middle attacks against TLS-protected connections. An attacker can intercept the connection and fool the client into accepting a malicious certificate, potentially compromising the confidentiality and integrity of the communication between the client and the NATS server (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.29.0 of the async-nats package. Users are strongly advised to upgrade to this version or later. The fix involves changes to the TLS connection validation process to prevent the acceptance of attacker-controlled certificate validation parameters (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65807HIGH8.4
  • RustRust
  • sd
NoNoDec 10, 2025
CVE-2025-66627HIGH7.8
  • RustRust
  • wasmi
NoYesDec 09, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management