CVE-2025-15467
Published Jan 27, 2026
Last updated 17 days ago
- Description
- Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.
- Source
- openssl-security@openssl.org
- NVD status
- Modified
- Products
- openssl
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- openssl-security@openssl.org
- CWE-787
- Hype score
- Not currently trending
How I Discovered OpenSSL Zero-Days That Weaponize MTN Ghana & Nigeria's Existing Breaches In January 2026, I found 12/12 OpenSSL zero-days (CVE-2025-15467: HIGH remote stack overflow pre-authentication). Some bugs lurked since 1998. OpenSSL encrypts about 2/3 of internet
@SierraSec_NG
11 Mar 2026
177 Impressions
1 Retweet
1 Like
1 Bookmark
0 Replies
0 Quotes
#VulnerabilityReport #cms Pre-Auth RCE Risk: OpenSSL Patches High-Severity Stack Overflow (CVE-2025-15467) https://t.co/kkxRyDVPhv
@Komodosec
6 Mar 2026
122 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#AppSec #Threat_Research 1⃣ Abusing Cortex XDR Live https://t.co/iDFLbQUjDQ 2⃣ Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability (CVE-2026-20127) https://t.co/BCwOGH8XHu 3⃣ OpenSSL Vulnerability (CVE-2025-15467) https://t.co/0CF1aieVHL
@ksg93rd
26 Feb 2026
425 Impressions
3 Retweets
9 Likes
6 Bookmarks
0 Replies
0 Quotes
🔍 Lambda Watchdog detected that CVE-2025-15467 is no longer present in latest AWS Lambda base image scans. https://t.co/QY1PA7iXs6 #AWS #Lambda #Security #CVE #DevOps #SecOps
@LambdaWatchdog
23 Feb 2026
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2025-15467 impacts openssl-fips-provider-latest in 40 Lambda base images. Details: https://t.co/QY1PA7iXs6 More: https://t.co/6EUGaPyRZk #AWS #Lambda #CVE #CloudSecurity #Serverless
@LambdaWatchdog
8 Feb 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 OpenSSL: CVE-2025-15467 / GHSA-wvhq-3h88-rf6g — CMS AuthEnvelopedData AEAD parsing stack overflow → DoS / potential RCE. Affected: 3.6<3.6.1, 3.5<3.5.5, 3.4<3.4.4, 3.3<3.3.6, 3.0<3.0.19. Check openssl version; upgrade now. https://t.co/uWggxsyIdz
@phaneragnosis
4 Feb 2026
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-15467: OpenSSL CMS AuthEnvelopedData Stack Buffer Overflow PoC https://t.co/PTU6pgK3pf
@Dinosn
3 Feb 2026
1922 Impressions
3 Retweets
13 Likes
6 Bookmarks
0 Replies
0 Quotes
OpenSSL is affected by a critical stack buffer overflow CVE-2025-15467 in CMS parsing, which may cause DoS and potential RCE. It affected 3.x versions up to 3.6.0. Update to 3.0.19, 3.3.6, 3.4.4, 3.5.5, or 3.6.1. Read more: https://t.co/7M170aNwwm https://t.co/UWa3E5tZMs
@wazuh
3 Feb 2026
596 Impressions
11 Retweets
15 Likes
1 Bookmark
0 Replies
0 Quotes
Tails: Επείγουσα ενημέρωση για ευπάθειες OpenSSL (CVE-2025-15467) – τι αλλάζει σε Tor και Thunderbird https://t.co/iEEtSYIN5s #Tails #OpenSSL #κυβερνοασφάλεια #ενημέρωσηασφαλείας #Tor #Thunderbird #
@TexnologiaNet
31 Jan 2026
71 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 OpenSSL CVE-2025-15467 [Critical] Jan 31, 2026 This report details a critical remote code execution vulnerability, CVE-2025-15467, affecting OpenSSL. The vulnerability is a stack buffer overflow in CMS AuthEnvelopedData parsing that can be exploited by unauthenticated... htt
@transilienceai
31 Jan 2026
70 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 OpenSSL Patches 12 Flaws, Including High-Severity Parsing Bugs That Could Enable RCE OpenSSL released updates fixing 12 vulnerabilities, including two high-severity stack buffer overflows (CVE-2025-15467 in CMS/PKCS#7 AEAD parsing and CVE-2025-11187 in PKCS#12 PBMAC1
@ThreatSynop
30 Jan 2026
78 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Potentially Critical RCE Vulnerability in OpenSSL - CVE-2025-15467 https://t.co/EzCjGG8x8m
@diego_pacheco
30 Jan 2026
80 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CRITICAL ALERT: OpenSSL Flaw A critical vulnerability (CVE-2025-15467, CVSS 9.8) dropped on January 27, 2026. It affects OpenSSL 3.0, 3.3, 3.4, 3.5, and 3.6, and it’s nasty. How Orca can help: https://t.co/M7xqhMwSzN https://t.co/4RGA9YZXdD
@orcasec
30 Jan 2026
140 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
when OpenSSL releases a patch for a high severity vulnerability, that usually means we have to pay attention 🟥 CVE-2025-15467, CVSS: 9.8 (Critical) OpenSSL versions 3.6, 3.5, 3.4, 3.3, and 3.0, OpenSSL. critical stack buffer overflow vulnerability attackers can exploit th
@UjlakiMarci
30 Jan 2026
136 Impressions
0 Retweets
0 Likes
1 Bookmark
1 Reply
0 Quotes
🔴 CVE-2025-15467 - Critical Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a c... https://t.co/uTP1CAP1mn https://t.co/F9oCY50Jbx
@TheHackerWire
30 Jan 2026
84 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-15467 (OpenSSL 3系のS/MIMEの脆弱性)に対応しているDocker公式Rubyイメージがまだないんだがどういうことや…。
@lyiase
30 Jan 2026
214 Impressions
1 Retweet
0 Likes
0 Bookmarks
1 Reply
0 Quotes
⚠️ OpenSSL patches high-severity RCE: CVE-2025-15467 Affects OpenSSL 3.0-3.6 branches. Patch to: 3.0.19, 3.3.6, 3.4.4, 3.5.5, 3.6.1. https://t.co/WHYvN1uheD
@Hacker_Manifest
30 Jan 2026
93 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Command Execution PoC for OpenSSL Stack buffer overflow CVE-2025-15467 https://t.co/qU9IPipxEp
@imguiimoraes
30 Jan 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-15467: High-Severity OpenSSL Stack Overflow Enables DoS (and Potential RCE) OpenSSL patched CVE-2025-15467, a stack buffer overflow in CMS AuthEnvelopedData parsing where an attacker can supply an oversized AEAD IV (e.g., AES-GCM) to trigger a crash (DoS) and, unde
@ThreatSynop
30 Jan 2026
104 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Security Update: Not all patches are created equal and this OpenSSL stack overflow (CVE-2025-15467) is a high-priority fix. Learn why this #vulnerability is uniquely dangerous, how it exploits the CMS AuthEnvelopedData structure, and get the technical roadmap to verify if yo
@jfrog
29 Jan 2026
244 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
OpenSSL ثغرة خطيرة تتطلب تحديث فوري OpenSSL أصلحت عدة ثغرات أمنية، أبرزها ثغرة Stack Overflow عالية الخطورة (CVE-2025-15467) تسمح بالتحكم بالجهاز عن بعد بدون مصادقة. هذه الثغ
@MisbarSec
29 Jan 2026
66 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Just testing the new #pruva autonomous reproduction platform against CVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing from @Aisle_Inc almost ready for the public :D #autonomousreproductions https://t.co/6WWzz1huyZ
@N3mes1s
29 Jan 2026
72 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 OpenSSL Patches 12 Flaws Including High-Severity Pre-Auth RCE Risks in CMS/PKCS#12 Parsing OpenSSL released fixes for 12 vulnerabilities, with the most serious being CVE-2025-15467 (stack overflow in CMS AuthEnvelopedData AEAD IV parsing, affecting OpenSSL 3.0–3.6) and
@ThreatSynop
29 Jan 2026
87 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2025-43529 2 - CVE-2026-24858 3 - CVE-2025-8088 4 - CVE-2025-15467 5 - CVE-2025-23049 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
29 Jan 2026
137 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
📌 ثغرات حرجة في OpenSSL تمكّن المهاجمين عن بُعد من تنفيذ تعليمات خبيثة 🛡️ الفئة: ثغرة 📝 الملخص: أصدرت OpenSSL تحديثاً لمعالجة 12 ثغرة، أبرزها الثغرة عالية ال
@GMashari
29 Jan 2026
169 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️OpenSSLに深刻な脆弱性 計12件の修正が発表。特にCVE-2025-15467は重要度「高」で、S/MIME等の処理を通じリモートコード実行(RCE)の恐れがあります。 #OpenSSL #セキュリティ #CybersecurityNews https://t.co/F7jymsQsqD
@motch_dev
29 Jan 2026
181 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
⚡ Potentially Critical RCE Vulnerability in OpenSSL - CVE-2025-15467 ⚡ The JFrog Security Research team is tracking a newly disclosed OpenSSL stack overflow vulnerability rated as High by OpenSSL, that may lead to remote code execution (RCE). This vulnerability was patched h
@JFrogSecurity
28 Jan 2026
3135 Impressions
5 Retweets
29 Likes
12 Bookmarks
1 Reply
1 Quote
OpenSSL January 2026 update addresses multiple vulnerabilities across versions 1.0.2, 1.1.1, and 3.x. Critical CVE-2025-15467 involves CMS AuthEnvelopedData AEAD parsing buffer overflow enabling potential RCE. #OpenSSL #BufferOverflow #USA https://t.co/Acg5RJ87Y1
@TweetThreatNews
28 Jan 2026
44 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Vulnerabilidad en OpenSSL ❗ CVE-2025-15467 ➡️ Más info: https://t.co/vQDGNf1dbc https://t.co/0TgzkvUQNR
@CERTpy
28 Jan 2026
182 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Vulnerabilidad CVE-2025-15467 OpenSSL | Desbordamiento del búfer de pila en el análisis de CMS AuthEnvelopedData #OpenSSL #CVE_2025_15467 #BufferOverflow https://t.co/ZnQbWnsPTd https://t.co/os6VniHzBE
@_Ninhack
28 Jan 2026
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CYBERDUDEBIVASH® Releases CMS IV Scanner to Mitigate CVE-2025-15467 and Related OpenSSL CMS IV Exploitation Risks Read the report below & grab the scanner now - https://t.co/VOGGzeuJwC https://t.co/b34Ldt0b3l
@cyberbivash
28 Jan 2026
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
OpenSSL Security Advisory 27th January 2026 https://t.co/FJSrYGvNwy 12 CVEs, 2 stack-based buffer overflows CVE-2025-15467 Stack buffer overflow in CMS AuthEnvelopedData parsing (High) CVE-2025-11187 Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (Moderate)
@oss_security
28 Jan 2026
1321 Impressions
4 Retweets
13 Likes
4 Bookmarks
0 Replies
0 Quotes
CVE-2025-15467: The OpenSSL Stack Overflow That Bypasses the Front Door. Read the full report on - https://t.co/8Pjl0n5DBh https://t.co/clZC8Dd3oC
@cyberbivash
28 Jan 2026
88 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️⚠️ CVE-2025-15467 in OpenSSL allows for unauthenticated stack overflows via crafted CMS messages. Potential for Remote Code Execution (RCE) makes this a priority patch for sysadmins. 🔗FOFA Link: https://t.co/o336k59BR3 🎯23M+ Results are found on the https://t.co/p
@fofabot
28 Jan 2026
1582 Impressions
10 Retweets
24 Likes
11 Bookmarks
0 Replies
0 Quotes
🚨 CRITICAL OPENSSL SECURITY ALERT 🚨 CVE-2025-15467 affects OpenSSL's processing of CMS/S/MIME messages. An unauthenticated remote attacker can cause DoS or execute code remotely by crafting a specific message. We estimate the CVSS score is 9.8. We developed a working Po
@IntCyberDigest
27 Jan 2026
49751 Impressions
132 Retweets
581 Likes
262 Bookmarks
7 Replies
11 Quotes
OpenSSLの脆弱性(High: CVE-2025-15467, Moderate: CVE-2025-11187, Low: CVE-2025-15468等, CVE-2026-22795, 22796)と新バージョン(3.6.1, 3.5.5, 3.4.4, 3.3.6, 3.0.19) #sios_tech #security #vulnerability #セキュリティ #脆弱性 #ssl #openssl https://t.co/7ZoDJS4OGU
@omokazuki
27 Jan 2026
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
OpenSSLに12件の新規脆弱性が発見され、パッチが公開されました。うち1件(CVE-2025-15467)はRCE可能な高深刻度とのこと。AI駆動の脆弱性発見が成果を上げた事例ですね。早急な更新を。 https://t.co/pfxTNEI9tE #脆弱
@dejital_secure
27 Jan 2026
125 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
oss-sec: OpenSSL Security Advisory Moderate: CVE-2025-11187 High: CVE-2025-15467 Low: CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796 https://t.co/CaU8ZbmxPD
@teenigma_
27 Jan 2026
99 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
OpenSSL 3.6.1 Is Now Available with Important Security Patches and Bug Fixes This release addresses CVE-2025-11187, CVE-2025-15467, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, and CVE-2025-69419. https://t.co/B6IFeEISru
@ytroncal
27 Jan 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-15467 Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer ove… https://t.co/DNj07EXCtW
@CVEnew
27 Jan 2026
156 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
RHEL7 8 9のopensslはnot affected RHEL10のみaffected 評価は 9.8 important // CVE-2025-15467 - Red Hat Customer Portal https://t.co/v5a7aiVl9c
@w4yh
27 Jan 2026
111 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
HighはCVE-2025-15467の1件だけですが積み残しのLowがたくさんですね CVE-2025-15467は"OpenSSL 1.1.1 and 1.0.2 are not affected by this issue."ですしS/MIME処理してるサーバーは私の手持ちには無いかな... < OpenSSL // https://t.co/uPbTgMsMZ
@w4yh
27 Jan 2026
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C76C5F55-5243-4461-82F5-2FEBFF4D59FA",
"versionEndExcluding": "3.0.19",
"versionStartIncluding": "3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5292E9E-6B50-409F-9219-7B0A04047AD8",
"versionEndExcluding": "3.3.6",
"versionStartIncluding": "3.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9D3DCAE-317D-4DFB-93F0-7A235A229619",
"versionEndExcluding": "3.4.4",
"versionStartIncluding": "3.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CAC7CBE-EC03-4089-938A-0CEEB2E09B62",
"versionEndExcluding": "3.5.5",
"versionStartIncluding": "3.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68352537-5E99-4F4D-B78A-BCF0353A70A5",
"versionEndExcluding": "3.6.1",
"versionStartIncluding": "3.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]