|
1 | 1 | { |
2 | 2 | "release_version": "release/v5.0-d9f9b7d8ed", |
3 | | - "scan_date": "2025-07-17T00:29:07.646483Z", |
| 3 | + "scan_date": "2025-07-18T00:28:47.611912Z", |
4 | 4 | "tool_version": "0.20.1", |
5 | 5 | "total_components": 0, |
6 | | - "vulnerabilities": [], |
| 6 | + "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cve_id": "CVE-2025-49600", |
| 9 | + "component": "mbed_tls", |
| 10 | + "component_version": "3.6.3", |
| 11 | + "severity": "MEDIUM", |
| 12 | + "score": "4.9", |
| 13 | + "vector": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", |
| 14 | + "description": "In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in mbedtls_lms_verify allow an attacker (who can induce a hardware hash accelerator fault) to bypass LMS signature verification by reusing stale stack data, resulting in acceptance of an invalid signature. In mbedtls_lms_verify, the return values of the internal Merkle tree functions create_merkle_leaf_value and create_merkle_internal_value are not checked. These functions return an integer that indicates whether the call succeeded or not. If a failure occurs, the output buffer (Tc_candidate_root_node) may remain uninitialized, and the result of the signature verification is unpredictable. When the software implementation of SHA-256 is used, these functions will not fail. However, with hardware-accelerated hashing, an attacker could use fault injection against the accelerator to bypass verification.", |
| 15 | + "link": "https://nvd.nist.gov/vuln/detail/CVE-2025-49600" |
| 16 | + }, |
| 17 | + { |
| 18 | + "cve_id": "CVE-2025-49601", |
| 19 | + "component": "mbed_tls", |
| 20 | + "component_version": "3.6.3", |
| 21 | + "severity": "MEDIUM", |
| 22 | + "score": "4.8", |
| 23 | + "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", |
| 24 | + "description": "In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.", |
| 25 | + "link": "https://nvd.nist.gov/vuln/detail/CVE-2025-49601" |
| 26 | + }, |
| 27 | + { |
| 28 | + "cve_id": "CVE-2025-52497", |
| 29 | + "component": "mbed_tls", |
| 30 | + "component_version": "3.6.3", |
| 31 | + "severity": "MEDIUM", |
| 32 | + "score": "4.8", |
| 33 | + "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", |
| 34 | + "description": "Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.", |
| 35 | + "link": "https://nvd.nist.gov/vuln/detail/CVE-2025-52497" |
| 36 | + } |
| 37 | + ], |
7 | 38 | "summary": { |
8 | | - "total_vulnerabilities": 0, |
| 39 | + "total_vulnerabilities": 3, |
9 | 40 | "by_severity": { |
10 | 41 | "CRITICAL": 0, |
11 | 42 | "HIGH": 0, |
12 | | - "MEDIUM": 0, |
| 43 | + "MEDIUM": 3, |
13 | 44 | "LOW": 0 |
14 | 45 | } |
15 | 46 | }, |
|
0 commit comments