2025-07-10
[email protected]
6.5
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
High
Lifecycle Timeline
4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-21000
CVE Published
Jul 10, 2025 - 16:15 nvd
MEDIUM 6.5
Description
A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().
Analysis
A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().
Technical Context
A NULL pointer dereference occurs when the application attempts to use a pointer that has not been initialized or has been set to NULL.
Remediation
Add NULL checks before pointer dereference operations. Use static analysis to identify potential NULL pointer issues. Enable compiler warnings.
Priority Score
33
Low
Medium
High
Critical
KEV: 0
EPSS: +0.1
CVSS: +32
POC: 0
Vendor Status
Ubuntu
Priority: Mediumgnutls28
| Release | Status | Version |
|---|---|---|
| upstream | released | 3.8.9-3 |
| oracular | ignored | end of life, was needs-triage |
| jammy | released | 3.7.3-4ubuntu1.7 |
| noble | released | 3.8.3-1.1ubuntu3.4 |
| plucky | released | 3.8.9-2ubuntu3.1 |
| bionic | not-affected | code not present |
| focal | released | 3.6.13-2ubuntu1.12+esm1 |
| xenial | not-affected | code not present |
| questing | released | 3.8.9-3ubuntu1 |
Debian
gnutls28
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | fixed | 3.7.1-5+deb11u8 | - |
| bullseye (security) | fixed | 3.7.1-5+deb11u9 | - |
| bookworm | fixed | 3.7.9-2+deb12u5 | - |
| bookworm (security) | fixed | 3.7.9-2+deb12u6 | - |
| trixie (security), trixie | fixed | 3.8.9-3+deb13u2 | - |
| forky, sid | fixed | 3.8.12-3 | - |
| (unstable) | fixed | 3.8.9-3 | - |
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-21000