Tech 3 min read

OpenSSL has a critical unauthenticated RCE vulnerability, CVE-2025-15467

IkesanContents

On January 27, 2026, OpenSSL released a security update. The release fixed 12 vulnerabilities, but CVE-2025-15467 is especially dangerous because it may allow remote code execution (RCE) without authentication.

Vulnerability Overview

ItemDetails
CVECVE-2025-15467
SeverityHigh
TypeStack buffer overflow
Affected versionsOpenSSL 3.0, 3.3, 3.4, 3.5, 3.6
Disclosure dateJanuary 27, 2026

OpenSSL 1.1.1 and 1.0.2 are not affected.

CVE-2025-15467: Stack overflow in CMS AuthEnvelopedData

Technical details

The issue occurs when processing CMS (Cryptographic Message Syntax) AuthEnvelopedData messages, specifically when AEAD ciphers such as AES-GCM are used.

The problem is in the handling of the initialization vector (IV). When the IV decoded from ASN.1 parameters is copied into a fixed-size stack buffer, its length is not validated. An attacker can send a crafted CMS message containing an oversized IV and trigger a stack-based buffer overflow.

Parse CMS AuthEnvelopedData
  └─ Process AEAD parameters
      └─ Copy IV into fixed-size buffer  ← no length validation
          └─ Stack buffer overflow

Why it is dangerous

What makes this vulnerability especially serious is that it happens before authentication.

Because the overflow occurs prior to authentication, no valid key material is required to trigger it.

That means an attacker does not need valid keys or credentials. Applications that process S/MIME AuthEnvelopedData or PKCS#7 content are potential targets.

Expected impact

  • DoS: process crash
  • RCE: arbitrary code execution may be possible depending on exploit sophistication

CVE-2025-11187: Buffer overflow in PKCS#12 verification

Another vulnerability fixed in the same release.

ItemDetails
CVECVE-2025-11187
SeverityModerate
TypeStack buffer overflow

During PKCS#12 file verification, a stack overflow occurs when the key length exceeds 64 bytes.

Affected versions and fixes

Current versionUpdate to
3.6.x3.6.1
3.5.x3.5.5
3.4.x3.4.4
3.3.x3.3.6
3.0.x3.0.19

The FIPS module is not affected because the CMS implementation sits outside the FIPS module boundary.

Check your version

openssl version

How to update

Update through your distribution’s package manager.

# Ubuntu/Debian
sudo apt update && sudo apt upgrade openssl

# RHEL/CentOS/Fedora
sudo dnf update openssl

# macOS (Homebrew)
brew upgrade openssl

If you build from source, get the latest release from OpenSSL Downloads.

AI discovered all 12 vulnerabilities

According to reports, all 12 vulnerabilities fixed in this release were discovered by AI systems from Aisle Research. This is being highlighted as a notable example of AI in security research.

References