Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11602: CWE-226: Sensitive Information in Resource Not Removed Before Reuse in neo4j Enterprise Edition

0
Medium
VulnerabilityCVE-2025-11602cvecve-2025-11602cwe-226
Published: Fri Oct 31 2025 (10/31/2025, 10:20:17 UTC)
Source: CVE Database V5
Vendor/Project: neo4j
Product: Enterprise Edition

Description

Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses.

AI-Powered Analysis

AILast updated: 10/31/2025, 10:38:05 UTC

Technical Analysis

CVE-2025-11602 is a vulnerability classified under CWE-226, which pertains to sensitive information not being properly removed before resource reuse. In this case, the Neo4j graph database's Bolt protocol handshake process in both Enterprise and Community editions (versions 5.26.0 and 2025.1.0) leaks one byte of information from previous connections. This occurs because the server reuses memory buffers without clearing sensitive data, allowing an attacker to glean residual data during the handshake. The attacker does not have control over the leaked byte, limiting the direct usefulness of the information. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 4.0 score is 6.3 (medium severity), reflecting the limited impact and scope. No patches or known exploits are currently available, but the flaw could be leveraged in multi-stage attacks or to infer sensitive server state. The leak affects confidentiality but not integrity or availability. The Bolt protocol is a core communication channel for Neo4j clients, so exposure of this channel to untrusted networks increases risk. Organizations using Neo4j in sensitive environments should consider this vulnerability in their threat models.

Potential Impact

For European organizations, the primary impact is a minor confidentiality breach where an attacker can obtain residual data from previous Neo4j connections. While the leak is limited to one byte and the attacker cannot control the content, this could potentially aid in reconnaissance or be combined with other vulnerabilities to escalate attacks. Organizations relying on Neo4j for critical data processing, such as financial institutions, telecommunications, or government agencies, may face increased risk if the Bolt protocol is exposed to untrusted networks. The vulnerability does not affect data integrity or availability, so direct disruption or data manipulation is unlikely. However, the presence of any information leak in a database system handling sensitive or regulated data (e.g., GDPR-protected personal data) could have compliance implications. The lack of authentication requirement means attackers can attempt exploitation remotely, increasing the threat surface. Overall, the impact is moderate but should not be ignored in high-security environments.

Mitigation Recommendations

1. Restrict network access to Neo4j Bolt protocol endpoints by implementing strict firewall rules and network segmentation to limit exposure to trusted clients only. 2. Monitor Neo4j vendor communications closely for patches or updates addressing CVE-2025-11602 and apply them promptly once available. 3. Employ encrypted VPN tunnels or secure network channels for all Neo4j client-server communications to reduce the risk of interception or exploitation. 4. Conduct regular security audits and memory management reviews in Neo4j deployments to detect potential residual data leaks. 5. Use application-layer controls to limit the number of concurrent connections and handshake attempts, reducing the attack surface. 6. Consider deploying intrusion detection systems (IDS) or anomaly detection tools to identify unusual handshake patterns or repeated connection attempts. 7. If feasible, upgrade to Neo4j versions not affected by this vulnerability once patches are released. 8. Document and review data classification and handling policies to ensure that any leaked data byte does not expose sensitive information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Neo4j
Date Reserved
2025-10-10T12:54:22.071Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69048e028338aee690446fba

Added to database: 10/31/2025, 10:22:58 AM

Last enriched: 10/31/2025, 10:38:05 AM

Last updated: 10/31/2025, 9:38:51 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats