CVE-2025-69418

EUVD-2025-206396
Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP and provider OCB implementations split inputs so that full<br>blocks and trailing partial blocks are processed in separate calls, avoiding<br>the problematic code path. Additionally, TLS does not use OCB ciphersuites.<br>The vulnerability only affects applications that call the low-level<br>CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with<br>non-block-aligned lengths in a single call on hardware-accelerated builds.<br>For these reasons the issue was assessed as Low severity.<br><br>The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected<br>by this issue, as OCB mode is not a FIPS-approved algorithm.<br><br>OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.<br><br>OpenSSL 1.0.2 is not affected by this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4 MEDIUM
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
opensslopenssl
1.1.1 ≤
𝑥
< 1.1.1ze
opensslopenssl
3.0.0 ≤
𝑥
< 3.0.19
opensslopenssl
3.3.0 ≤
𝑥
< 3.3.6
opensslopenssl
3.4.0 ≤
𝑥
< 3.4.4
opensslopenssl
3.5.0 ≤
𝑥
< 3.5.5
opensslopenssl
3.6.0 ≤
𝑥
< 3.6.1
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
SiemensSIMATIC S7-1500 TM MFP - GNU\/Linux subsystem
𝑥
< *
ADP
Debian logo
Debian Releases
Debian Product
Codename
openssl
bookworm
3.0.20-1~deb12u1
fixed
bookworm (security)
3.0.19-1~deb12u2
fixed
bullseye
vulnerable
bullseye (security)
1.1.1w-0+deb11u5
fixed
forky
3.6.2-1
fixed
sid
3.6.2-1
fixed
trixie
3.5.6-1~deb13u1
fixed
trixie (security)
3.5.5-1~deb13u2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
bionic
Fixed 1.1.1-1ubuntu2.1~18.04.23+esm7
released
focal
Fixed 1.1.1f-1ubuntu2.24+esm2
released
jammy
Fixed 3.0.2-0ubuntu1.21
released
noble
Fixed 3.0.13-0ubuntu3.7
released
plucky
ignored
questing
Fixed 3.5.3-1ubuntu3
released
resolute
Fixed 3.5.5-1ubuntu1
released
trusty
not-affected
xenial
not-affected
openssl1.0
bionic
not-affected
jammy
dne
noble
dne
plucky
dne
questing
dne
resolute
dne
nodejs
bionic
needs-triage
focal
not-affected
jammy
needed
noble
not-affected
plucky
not-affected
questing
not-affected
resolute
not-affected
trusty
not-affected
xenial
ignored
edk2
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
noble
needs-triage
plucky
ignored
questing
needs-triage
resolute
needs-triage
xenial
ignored
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
libopenssl-3-devel
suse enterprise desktop 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise sap 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise server 15 SP4
3.0.8-150400.4.78.1
fixed
suse enterprise server 15 SP5
3.0.8-150500.5.57.1
fixed
suse enterprise server 15 SP6
3.1.4-150600.5.42.1
fixed
suse enterprise server 15 SP7
3.2.3-150700.5.24.1
fixed
libopenssl-3-fips-provider
suse enterprise desktop 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise sap 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise server 15 SP6
3.1.4-150600.5.42.1
fixed
suse enterprise server 15 SP7
3.2.3-150700.5.24.1
fixed
libopenssl-3-fips-provider-32bit
suse enterprise desktop 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise sap 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise server 15 SP6
3.1.4-150600.5.42.1
fixed
suse enterprise server 15 SP7
3.2.3-150700.5.24.1
fixed
libopenssl3
suse enterprise desktop 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise sap 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise server 15 SP4
3.0.8-150400.4.78.1
fixed
suse enterprise server 15 SP5
3.0.8-150500.5.57.1
fixed
suse enterprise server 15 SP6
3.1.4-150600.5.42.1
fixed
suse enterprise server 15 SP7
3.2.3-150700.5.24.1
fixed
libopenssl3-32bit
suse enterprise desktop 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise sap 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise server 15 SP6
3.1.4-150600.5.42.1
fixed
suse enterprise server 15 SP7
3.2.3-150700.5.24.1
fixed
openssl-3
suse enterprise desktop 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise sap 15 SP7
3.2.3-150700.5.24.1
fixed
suse enterprise server 15 SP4
3.0.8-150400.4.78.1
fixed
suse enterprise server 15 SP5
3.0.8-150500.5.57.1
fixed
suse enterprise server 15 SP6
3.1.4-150600.5.42.1
fixed
suse enterprise server 15 SP7
3.2.3-150700.5.24.1
fixed
Red Hat logo
Red Hat Enterprise Linux Releases
Red Hat Product
Release
openssl
RHEL 9
1:3.5.1-7.el9_7
fixed
openssl-devel
RHEL 9
1:3.5.1-7.el9_7
fixed
openssl-libs
RHEL 9
1:3.5.1-7.el9_7
fixed
openssl-perl
RHEL 9
1:3.5.1-7.el9_7
fixed