CVE Vulnerabilities

CVE-2025-69418

Missing Cryptographic Step

Published: Jan 27, 2026 | Modified: Jan 29, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
4 LOW
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Issue summary: When using the low-level OCB API directly with AES-NI orother hardware-accelerated code paths, inputs whose length is not a multipleof 16 bytes can leave the final partial block unencrypted and unauthenticated.Impact summary: The trailing 1-15 bytes of a message may be exposed incleartext on encryption and are not covered by the authentication tag,allowing an attacker to read or tamper with those bytes without detection.The low-level OCB encrypt and decrypt routines in the hardware-acceleratedstream path process full 16-byte blocks but do not advance the input/outputpointers. The subsequent tail-handling code then operates on the originalbase pointers, effectively reprocessing the beginning of the buffer whileleaving the actual trailing bytes unprocessed. The authentication checksumalso excludes the true tail bytes.However, typical OpenSSL consumers using EVP are not affected because thehigher-level EVP and provider OCB implementations split inputs so that fullblocks and trailing partial blocks are processed in separate calls, avoidingthe problematic code path. Additionally, TLS does not use OCB ciphersuites.The vulnerability only affects applications that call the low-levelCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly withnon-block-aligned lengths in a single call on hardware-accelerated builds.For these reasons the issue was assessed as Low severity.The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affectedby this issue, as OCB mode is not a FIPS-approved algorithm.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.OpenSSL 1.0.2 is not affected by this issue.

Weakness

The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Enterprise Linux 10RedHatopenssl-1:3.5.1-7.el10_1*
Red Hat Enterprise Linux 9RedHatopenssl-1:3.5.1-7.el9_7*
Red Hat Enterprise Linux 9RedHatopenssl-1:3.5.1-7.el9_7*
Edk2Ubuntuplucky*
NodejsUbuntuesm-apps/jammy*
NodejsUbuntujammy*
OpensslUbuntudevel*
OpensslUbuntuesm-infra/bionic*
OpensslUbuntuesm-infra/focal*
OpensslUbuntufips-preview/jammy*
OpensslUbuntufips-updates/bionic*
OpensslUbuntufips-updates/focal*
OpensslUbuntufips-updates/jammy*
OpensslUbuntufips/bionic*
OpensslUbuntufips/focal*
OpensslUbuntujammy*
OpensslUbuntunoble*
OpensslUbuntuplucky*
OpensslUbuntuquesting*
OpensslUbuntuupstream*

References