CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview

OpenSSL vulnerability CVE-2025-15467 Remote Code Execution Denial of Service Cybersecurity OpenSSL 3.x Vulnerability patch
Divyansh Ingle
Divyansh Ingle

Head of Engineering

 
March 10, 2026
4 min read
CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview

TL;DR

  • A critical OpenSSL vulnerability, CVE-2025-15467, has been disclosed, impacting OpenSSL 3.x versions. This flaw allows pre-authentication remote code execution and denial of service due to a stack buffer overflow when parsing malformed encrypted messages. Immediate patching is crucial for any infrastructure processing S/MIME email or untrusted CMS content, as the vulnerability has a CVSS score of 9.8 and low attack complexity.

Critical OpenSSL Vulnerability: CVE-2025-15467 Enables Pre-Auth Remote Code Execution

A critical vulnerability, CVE-2025-15467, CVSS 9.8, was disclosed on January 27, 2026, affecting OpenSSL versions 3.0, 3.3, 3.4, 3.5, and 3.6. An attacker can exploit a stack buffer overflow by sending a malformed encrypted message. This overflow occurs before OpenSSL validates the message, requiring no encryption keys or authentication. If your infrastructure processes S/MIME email or untrusted CMS content, immediate patching is crucial.

Vulnerability Summary

The OpenSSL CMS module parses encrypted messages. When handling AEAD ciphers like AES-GCM, it extracts an Initialization Vector (IV). OpenSSL expects this IV to be 12-16 bytes and allocates a 16-byte buffer on the stack. The vulnerability lies in OpenSSL's failure to validate the message’s claimed IV length before copying it. An oversized IV can overflow the buffer, corrupting adjacent memory, leading to application crashes or potential remote code execution.

Why This Vulnerability Matters

This vulnerability is particularly dangerous due to:

  1. Pre-authentication exploitation: The overflow happens during initial parsing, before any cryptographic verification.
  2. Low attack complexity: CVSS rates this as 9.8 with low attack complexity and no privileges required.
  3. Wide deployment: OpenSSL 3.x is used in numerous mail servers, web servers, and embedded systems.

The attack surface includes any service parsing external CMS or PKCS#7 content. SOC Prime’s Platform offers real-time detection intelligence and detection rules for such vulnerabilities.

Technical Deep Dive

The vulnerable function is evp_cipher_get_asn1_aead_params() in crypto/evp/evp_lib.c, according to JFrog Security Research.

Vulnerable Code Path

Image courtesy of Penligent

The vulnerable code path involves:

  1. Application calling CMS_decrypt() to process a message.
  2. OpenSSL parsing the structure and identifying AEAD encryption.
  3. Extracting the IV from ASN.1-encoded parameters.
  4. Copying the IV to a 16-byte stack buffer without length validation.
  5. An oversized IV overflowing into adjacent stack memory.

The fix involves validating that the IV length ≤ EVP_MAX_IV_LENGTH before copying.

Potential Impact

The vulnerability guarantees denial of service due to process crashes. Remote code execution is possible, depending on platform mitigations. Red Hat notes that their Enterprise Linux builds include stack protections that mitigate code execution risks, but denial of service remains possible. Ubuntu's security team states that compiler hardening would reduce a stack buffer overflow to a denial of service only. Systems lacking modern protections face a higher RCE risk.

Affected Versions and Remediation

The following OpenSSL versions are affected:

Vulnerable Fixed
3.6.0 3.6.1
3.5.0 – 3.5.4 3.5.5
3.4.0 – 3.4.3 3.4.4
3.3.0 – 3.3.5 3.3.6
3.0.0 – 3.0.18 3.0.19

OpenSSL versions 1.1.1 and 1.0.2 are not affected. FIPS modules are also unaffected. OpenSSL 3.1 (EOL March 2025) and 3.2 (EOL November 2025) likely contain this vulnerability but will not receive patches.

Threat Landscape

Currently:

  • No public PoC is available.
  • The vulnerability is not listed in the CISA KEV.
  • There are no confirmed reports of active exploitation.

Given the detailed technical information available, attackers are likely to weaponize this vulnerability quickly.

Discovery

CVE-2025-15467 was one of 12 vulnerabilities discovered by AISLE, using AI-driven vulnerability discovery.

Identifying Vulnerable Assets

Identifying assets running vulnerable OpenSSL versions and understanding their exposure context is critical.

Practical Implications and Mitigation Strategies

The vulnerability is triggered when parsing CMS AuthEnvelopedData, commonly used in S/MIME and PKCS#7 workflows. Environments that parse untrusted CMS AuthEnvelopedData or verify MACs on untrusted PKCS#12 files are at higher risk. This includes S/MIME email clients, email security gateways, certificate import/export services, PKI/CA tooling, and applications that accept uploaded CMS or PKCS#12 files.

Rank systems by message parsing exposure, not just package presence, to prioritize remediation efforts.

Reproducing the Vulnerability

The denial-of-service aspect of the vulnerability can be reproduced using the openssl cms -decrypt command against a specially crafted PEM file. Datadog provides an example of this, demonstrating a stack-smashing termination.

Gopher Security's AI-Powered Zero-Trust Solution

Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture. Our platform converges networking and security across devices, apps, and environments using peer-to-peer encrypted tunnels and quantum-resistant cryptography. We provide solutions that ensure robust protection against vulnerabilities like CVE-2025-15467, combining network and security across endpoints, private networks, cloud environments, and remote access.

By leveraging Gopher Security's AI-driven vulnerability detection and post-quantum encryption, organizations can proactively identify and mitigate risks associated with OpenSSL and other critical software components. Our Zero-Trust architecture ensures that all access is verified, regardless of location or device, minimizing the attack surface and preventing unauthorized access.

Explore Gopher Security's services or contact us to learn how we can help you protect your organization against the latest cyber threats.

Divyansh Ingle
Divyansh Ingle

Head of Engineering

 

AI and cybersecurity expert with 15-year large scale system engineering experience. Great hands-on engineering director.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article