Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65494: n/a

0
High
VulnerabilityCVE-2025-65494cvecve-2025-65494
Published: Mon Nov 24 2025 (11/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65494 is a high-severity vulnerability in libcoap 4. 3. 5, where a NULL pointer dereference occurs in the get_san_or_cn_from_cert() function when processing crafted X. 509 certificates. This flaw allows remote attackers to cause a denial of service (DoS) without requiring authentication or user interaction. The vulnerability arises because sk_GENERAL_NAME_value() can return NULL, which is not properly handled, leading to a crash. There are no known exploits in the wild yet, but the CVSS score of 7. 5 indicates a significant risk. European organizations using libcoap in IoT or constrained device environments should be particularly vigilant. Mitigation involves applying patches once available and implementing strict certificate validation and input sanitization.

AI-Powered Analysis

AILast updated: 12/01/2025, 14:42:02 UTC

Technical Analysis

CVE-2025-65494 identifies a NULL pointer dereference vulnerability in the get_san_or_cn_from_cert() function within the src/coap_openssl.c file of libcoap version 4.3.5. Libcoap is a widely used open-source implementation of the Constrained Application Protocol (CoAP), primarily deployed in IoT and constrained network environments. The vulnerability occurs when the function attempts to extract Subject Alternative Name (SAN) or Common Name (CN) fields from an X.509 certificate. Specifically, the function calls sk_GENERAL_NAME_value(), which can return NULL if the certificate is crafted maliciously. The code does not check for this NULL return value before dereferencing it, resulting in a NULL pointer dereference and subsequent application crash. This leads to a denial of service condition, as the affected libcoap-based service or device becomes unresponsive or terminates unexpectedly. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. Although no public exploits have been reported yet, the CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) reflects a high severity due to the ease of exploitation and impact on availability. The flaw is categorized under CWE-476 (NULL Pointer Dereference), a common programming error that can cause crashes or unpredictable behavior. Since libcoap is embedded in many IoT devices and constrained environments, this vulnerability could disrupt critical services relying on CoAP for communication, such as smart meters, industrial sensors, and building automation systems.

Potential Impact

For European organizations, the primary impact of CVE-2025-65494 is the potential denial of service on devices and services using libcoap 4.3.5. This can lead to outages in IoT deployments, industrial control systems, and smart infrastructure that depend on CoAP for lightweight communication. Disruptions could affect utilities, manufacturing, transportation, and smart city applications, causing operational downtime and potential safety risks. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, availability loss can have cascading effects on dependent systems. The lack of authentication or user interaction requirements means attackers can remotely trigger the DoS, increasing the threat surface. European critical infrastructure operators and enterprises with extensive IoT deployments may face increased risk of service interruptions, impacting business continuity and regulatory compliance. Additionally, the vulnerability could be leveraged as part of larger attack campaigns targeting IoT ecosystems, amplifying its impact.

Mitigation Recommendations

To mitigate CVE-2025-65494, organizations should prioritize updating libcoap to a patched version once it becomes available from the maintainers. In the interim, applying custom patches or workarounds to add NULL checks after sk_GENERAL_NAME_value() calls can prevent crashes. Network-level mitigations include filtering and validating incoming certificates to block malformed or suspicious X.509 certificates before they reach vulnerable devices. Implementing strict certificate validation policies and using certificate pinning where feasible can reduce exposure. Monitoring logs and network traffic for unusual certificate-related errors or crashes can help detect exploitation attempts early. For critical deployments, consider isolating vulnerable devices from untrusted networks and employing intrusion detection systems tuned for CoAP anomalies. Vendors and integrators should review their firmware and software supply chains to ensure updated libcoap versions are deployed promptly. Finally, raising awareness among IoT device operators about this vulnerability will facilitate faster response and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692467ebff33e781bff0e362

Added to database: 11/24/2025, 2:12:59 PM

Last enriched: 12/1/2025, 2:42:02 PM

Last updated: 12/2/2025, 6:51:50 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats