CVE Vulnerabilities

CVE-2025-12816

Interpretation Conflict

Published: Nov 25, 2025 | Modified: Jan 02, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
8.7 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Ubuntu
MEDIUM

An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions.

Weakness

Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B’s state.

Affected Software

Name Vendor Start Version End Version
Forge Digitalbazaar * 1.3.1 (including)
Red Hat OpenShift Service Mesh 2.6 RedHat openshift-service-mesh/kiali-ossmc-rhel8:sha256:ab2b4a1a2d1e5230e3c092af3827a21c0838702ae227afd786925d1704002afd *
Red Hat OpenShift Service Mesh 2.6 RedHat openshift-service-mesh/kiali-rhel8:sha256:5fa584e152eb852c9f9dd2ec07c4857924a87470bb92934cbd48efdb0ca238ba *
Red Hat OpenShift Service Mesh 3.0 RedHat openshift-service-mesh/kiali-ossmc-rhel9:sha256:a529baf5f8aef4932058b377ded468cc291c1c04a326c8e1d6275ad0bde495a2 *
Red Hat OpenShift Service Mesh 3.0 RedHat openshift-service-mesh/kiali-rhel9:sha256:c012e5fdf21c90d8d504164ddec9b294c5c347df078049fcd4e20a9ebe2f76cc *
Red Hat OpenShift Service Mesh 3.1 RedHat openshift-service-mesh/kiali-ossmc-rhel9:sha256:75b9064c9e83a08e0147ff97fd45ca8b3adb6f16bccedf66c146a74a8c769b25 *
Red Hat OpenShift Service Mesh 3.1 RedHat openshift-service-mesh/kiali-rhel9:sha256:ef0ddf23bae41b1c9aad0b05c90aecc2a21b45e125013a139e705c27285907c5 *
Red Hat OpenShift Service Mesh 3.2 RedHat openshift-service-mesh/kiali-ossmc-rhel9:sha256:8075a2d2d3d00efdce0280e00fa2724d339703a236ef7c74e546c4f0ce023d9b *
Red Hat OpenShift Service Mesh 3.2 RedHat openshift-service-mesh/kiali-rhel9:sha256:078340c685503fbb211a66d8016d795a647881e735f5d9f9e89a39e64f21b5cd *

References