CVE-2025-6338: CWE-459 Incomplete Cleanup in The Qt Company Qt
There is an incomplete cleanup vulnerability in Qt Network's Schannel support on Windows which can lead to a Denial of Service over a long period.This issue affects Qt from 5.15.0 through 6.8.3, from 6.9.0 before 6.9.2.
AI Analysis
Technical Summary
CVE-2025-6338 is a critical security vulnerability identified in The Qt Company's Qt framework, specifically within the Qt Network module's Schannel support on Windows platforms. The vulnerability is categorized under CWE-459, indicating incomplete cleanup of resources after their use. This flaw affects Qt versions starting from 5.15.0 through 6.8.3, and versions 6.9.0 prior to 6.9.2. The incomplete cleanup can lead to resource exhaustion over time, resulting in a Denial of Service (DoS) condition. Exploitation does not require authentication, user interaction, or privileges, and can be triggered remotely over the network, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H) reflects network attack vector, low complexity, no privileges or user interaction needed, no impact on confidentiality or integrity, but high impact on availability, and high scope indicating the vulnerability affects components beyond the vulnerable code itself. No patches have been released yet, and no known exploits are reported in the wild. The vulnerability primarily impacts Windows systems using Qt's Schannel integration, which is commonly used for secure network communications. This issue can cause prolonged service outages or application crashes, affecting the reliability of software built on Qt. Organizations relying on Qt-based applications for critical infrastructure or services may experience significant disruptions if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-6338 is significant due to the widespread use of Qt in various industries including automotive, telecommunications, industrial automation, and software development. The vulnerability's ability to cause Denial of Service remotely without requiring authentication or user interaction means attackers can disrupt services at scale, potentially affecting critical business operations and customer-facing applications. In sectors such as finance, healthcare, and public services, where availability is crucial, this could lead to operational downtime, loss of productivity, and reputational damage. Additionally, organizations using Qt in embedded systems or IoT devices running Windows could face cascading failures or safety risks. The lack of a current patch increases exposure time, necessitating heightened vigilance. The high CVSS score underscores the urgency for European entities to assess their exposure and implement mitigations promptly. The disruption could also affect supply chains and third-party vendors relying on Qt, amplifying the impact across interconnected systems.
Mitigation Recommendations
1. Immediate inventory and assessment: Identify all systems and applications using affected Qt versions with Schannel support on Windows. 2. Monitor vendor communications: Stay alert for official patches or updates from The Qt Company and apply them promptly once available. 3. Temporary workarounds: Where feasible, disable or isolate network components using Qt's Schannel support to limit exposure. 4. Network-level protections: Implement firewall rules and intrusion detection/prevention systems to monitor and block suspicious traffic targeting vulnerable services. 5. Resource monitoring: Set up alerts for unusual resource consumption patterns indicative of incomplete cleanup exploitation, enabling early detection of DoS attempts. 6. Application updates: Coordinate with software vendors or internal development teams to update Qt dependencies to patched versions as soon as they are released. 7. Segmentation: Isolate critical systems running vulnerable Qt applications to contain potential disruptions. 8. Incident response readiness: Prepare response plans for potential DoS incidents, including fallback procedures and communication strategies. 9. Security testing: Conduct penetration testing and vulnerability scans focusing on Qt-based applications to identify exposure and validate mitigations. 10. Documentation and training: Educate IT and security teams about the vulnerability specifics and response measures to ensure rapid action.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-6338: CWE-459 Incomplete Cleanup in The Qt Company Qt
Description
There is an incomplete cleanup vulnerability in Qt Network's Schannel support on Windows which can lead to a Denial of Service over a long period.This issue affects Qt from 5.15.0 through 6.8.3, from 6.9.0 before 6.9.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-6338 is a critical security vulnerability identified in The Qt Company's Qt framework, specifically within the Qt Network module's Schannel support on Windows platforms. The vulnerability is categorized under CWE-459, indicating incomplete cleanup of resources after their use. This flaw affects Qt versions starting from 5.15.0 through 6.8.3, and versions 6.9.0 prior to 6.9.2. The incomplete cleanup can lead to resource exhaustion over time, resulting in a Denial of Service (DoS) condition. Exploitation does not require authentication, user interaction, or privileges, and can be triggered remotely over the network, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H) reflects network attack vector, low complexity, no privileges or user interaction needed, no impact on confidentiality or integrity, but high impact on availability, and high scope indicating the vulnerability affects components beyond the vulnerable code itself. No patches have been released yet, and no known exploits are reported in the wild. The vulnerability primarily impacts Windows systems using Qt's Schannel integration, which is commonly used for secure network communications. This issue can cause prolonged service outages or application crashes, affecting the reliability of software built on Qt. Organizations relying on Qt-based applications for critical infrastructure or services may experience significant disruptions if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-6338 is significant due to the widespread use of Qt in various industries including automotive, telecommunications, industrial automation, and software development. The vulnerability's ability to cause Denial of Service remotely without requiring authentication or user interaction means attackers can disrupt services at scale, potentially affecting critical business operations and customer-facing applications. In sectors such as finance, healthcare, and public services, where availability is crucial, this could lead to operational downtime, loss of productivity, and reputational damage. Additionally, organizations using Qt in embedded systems or IoT devices running Windows could face cascading failures or safety risks. The lack of a current patch increases exposure time, necessitating heightened vigilance. The high CVSS score underscores the urgency for European entities to assess their exposure and implement mitigations promptly. The disruption could also affect supply chains and third-party vendors relying on Qt, amplifying the impact across interconnected systems.
Mitigation Recommendations
1. Immediate inventory and assessment: Identify all systems and applications using affected Qt versions with Schannel support on Windows. 2. Monitor vendor communications: Stay alert for official patches or updates from The Qt Company and apply them promptly once available. 3. Temporary workarounds: Where feasible, disable or isolate network components using Qt's Schannel support to limit exposure. 4. Network-level protections: Implement firewall rules and intrusion detection/prevention systems to monitor and block suspicious traffic targeting vulnerable services. 5. Resource monitoring: Set up alerts for unusual resource consumption patterns indicative of incomplete cleanup exploitation, enabling early detection of DoS attempts. 6. Application updates: Coordinate with software vendors or internal development teams to update Qt dependencies to patched versions as soon as they are released. 7. Segmentation: Isolate critical systems running vulnerable Qt applications to contain potential disruptions. 8. Incident response readiness: Prepare response plans for potential DoS incidents, including fallback procedures and communication strategies. 9. Security testing: Conduct penetration testing and vulnerability scans focusing on Qt-based applications to identify exposure and validate mitigations. 10. Documentation and training: Educate IT and security teams about the vulnerability specifics and response measures to ensure rapid action.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- TQtC
- Date Reserved
- 2025-06-19T10:25:01.875Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f0be6f9f8a5dbaeac53a72
Added to database: 10/16/2025, 9:44:15 AM
Last enriched: 10/16/2025, 9:59:04 AM
Last updated: 10/16/2025, 3:00:49 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61543: n/a
UnknownCVE-2025-61541: n/a
UnknownCVE-2025-61536: n/a
UnknownCVE-2025-41254: CWE-352: Cross-Site Request Forgery (CSRF) in VMware Spring Framework
MediumCVE-2025-36002: Password in Configuration File in IBM Sterling B2B Integrator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.