{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6703","assignerOrgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","state":"PUBLISHED","assignerShortName":"mozilla","dateReserved":"2025-06-26T09:14:53.851Z","datePublished":"2025-06-26T09:30:03.893Z","dateUpdated":"2025-06-26T12:59:56.348Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"neqo","repo":"https://github.com/mozilla/neqo","vendor":"Mozilla","versions":[{"lessThanOrEqual":"0.13.2","status":"affected","version":"0.4.24","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper Input Validation vulnerability in Mozilla neqo leads to an unexploitable crash..<p>This issue affects neqo: from 0.4.24 through 0.13.2.</p>"}],"value":"Improper Input Validation vulnerability in Mozilla neqo leads to an unexploitable crash..This issue affects neqo: from 0.4.24 through 0.13.2."}],"impacts":[{"capecId":"CAPEC-227","descriptions":[{"lang":"en","value":"CAPEC-227 Sustained Client Engagement"}]}],"metrics":[{"cvssV4_0":{"Automatable":"YES","Recovery":"AUTOMATIC","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":2.3,"baseSeverity":"LOW","privilegesRequired":"NONE","providerUrgency":"CLEAR","subAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/AU:Y/R:A/RE:L/U:Clear","version":"4.0","vulnAvailabilityImpact":"LOW","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"LOW"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","shortName":"mozilla","dateUpdated":"2025-06-26T09:30:03.893Z"},"references":[{"url":"https://github.com/mozilla/neqo/security/advisories/GHSA-jfv6-x22w-grhf"}],"source":{"advisory":"https://github.com/mozilla/neqo/security/advisories/GHSA-jfv6-x2","discovery":"EXTERNAL"},"title":"transport/fc.rs: panic attempting to send MAX_DATA with value larger max varint","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-26T12:59:51.900982Z","id":"CVE-2025-6703","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-26T12:59:56.348Z"}}]}}