EUVD-2025-20079

| CVE-2025-49601 MEDIUM
2025-07-04 [email protected]
4.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
Low

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 16, 2026 - 02:42 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 02:42 euvd
EUVD-2025-20079
CVE Published
Jul 04, 2025 - 15:15 nvd
MEDIUM 4.8

Description

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.

Analysis

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.

Technical Context

An out-of-bounds memory access occurs when code reads from or writes to memory locations outside the intended buffer boundaries. This vulnerability is classified as Out-of-bounds Read (CWE-125).

Affected Products

Affected products: Arm Mbed Tls

Remediation

Implement proper bounds checking on all array and buffer accesses. Use memory-safe languages or static analysis tools to detect OOB issues.

Priority Score

24
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +24
POC: 0

Vendor Status

Ubuntu

Priority: Medium
mbedtls
Release Status Version
oracular ignored end of life, was needs-triage
bionic not-affected code not present
focal not-affected code not present
jammy not-affected code not present
noble not-affected code not present
upstream released 3.6.4
xenial not-affected code not present
plucky ignored end of life, was needed
questing needed -

Debian

Bug #1108788
mbedtls
Release Status Fixed Version Urgency
bullseye not-affected - -
bullseye (security) fixed 2.16.9-0.1+deb11u3 -
bookworm not-affected - -
trixie fixed 3.6.5-0.1~deb13u1 -
forky, sid fixed 3.6.5-0.1 -
(unstable) fixed 3.6.4-1 -

Share

EUVD-2025-20079 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy