{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15468","assignerOrgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","state":"PUBLISHED","assignerShortName":"openssl","dateReserved":"2026-01-06T09:27:08.013Z","datePublished":"2026-01-27T16:01:20.824Z","dateUpdated":"2026-01-29T14:53:03.572Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"OpenSSL","vendor":"OpenSSL","versions":[{"lessThan":"3.6.1","status":"affected","version":"3.6.0","versionType":"semver"},{"lessThan":"3.5.5","status":"affected","version":"3.5.0","versionType":"semver"},{"lessThan":"3.4.4","status":"affected","version":"3.4.0","versionType":"semver"},{"lessThan":"3.3.6","status":"affected","version":"3.3.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"Stanislav Fort (Aisle Research)"},{"lang":"en","type":"remediation developer","value":"Stanislav Fort (Aisle Research)"}],"datePublic":"2026-01-27T14:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Issue summary: If an application using the SSL_CIPHER_find() function in<br>a QUIC protocol client or server receives an unknown cipher suite from<br>the peer, a NULL dereference occurs.<br><br>Impact summary: A NULL pointer dereference leads to abnormal termination of<br>the running process causing Denial of Service.<br><br>Some applications call SSL_CIPHER_find() from the client_hello_cb callback<br>on the cipher ID received from the peer. If this is done with an SSL object<br>implementing the QUIC protocol, NULL pointer dereference will happen if<br>the examined cipher ID is unknown or unsupported.<br><br>As it is not very common to call this function in applications using the QUIC <br>protocol and the worst outcome is Denial of Service, the issue was assessed<br>as Low severity.<br><br>The vulnerable code was introduced in the 3.2 version with the addition<br>of the QUIC protocol support.<br><br>The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,<br>as the QUIC implementation is outside the OpenSSL FIPS module boundary.<br><br>OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.<br><br>OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue."}],"value":"Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue."}],"metrics":[{"format":"other","other":{"content":{"text":"Low"},"type":"https://openssl-library.org/policies/general/security-policy/"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-476","description":"CWE-476 NULL Pointer Dereference","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl","dateUpdated":"2026-01-27T16:01:20.824Z"},"references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory"],"url":"https://openssl-library.org/news/secadv/20260127.txt"},{"name":"3.6.1 git commit","tags":["patch"],"url":"https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4"},{"name":"3.5.5 git commit","tags":["patch"],"url":"https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65"},{"name":"3.4.4 git commit","tags":["patch"],"url":"https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2"},{"name":"3.3.6 git commit","tags":["patch"],"url":"https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7"}],"source":{"discovery":"UNKNOWN"},"title":"NULL dereference in SSL_CIPHER_find() function on unknown cipher ID","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.9,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2026-01-29T14:52:10.289567Z","id":"CVE-2025-15468","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-29T14:53:03.572Z"}}]}}