Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65495: n/a

0
High
VulnerabilityCVE-2025-65495cvecve-2025-65495
Published: Mon Nov 24 2025 (11/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65495 is a high-severity vulnerability in the OISM libcoap 4. 3. 5 library, caused by an integer signedness error in the tls_verify_call_back() function. This flaw allows remote attackers to trigger a denial of service by sending a specially crafted TLS certificate that causes the i2d_X509() function to return -1, which is then incorrectly used as a malloc() size parameter. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The vulnerability impacts the availability of applications using the affected libcoap version, potentially causing crashes or service interruptions. No known exploits are currently reported in the wild, and no patches have been published yet. European organizations relying on libcoap 4. 3. 5 in IoT, constrained devices, or CoAP-based communication systems are at risk.

AI-Powered Analysis

AILast updated: 12/01/2025, 14:42:28 UTC

Technical Analysis

CVE-2025-65495 identifies a vulnerability in the OISM libcoap version 4.3.5, specifically within the tls_verify_call_back() function located in src/coap_openssl.c. The root cause is an integer signedness error related to the handling of the return value from the i2d_X509() function, which converts an X.509 certificate to DER format. When i2d_X509() returns -1 due to a crafted TLS certificate, this negative value is mistakenly used as a size parameter for malloc(), leading to undefined behavior such as memory allocation failures or buffer overflows. This misuse can cause the affected application to crash or become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability can be exploited remotely without requiring authentication or user interaction, as it is triggered during TLS certificate verification. The CVSS v3.1 score of 7.5 reflects a high severity, emphasizing the ease of remote exploitation and the significant impact on availability. The vulnerability is categorized under CWE-195 (Signed to Unsigned Conversion Error), highlighting the improper handling of signed integer values. No patches or fixes have been released at the time of publication, and no active exploits have been reported. The affected component, libcoap, is widely used in constrained environments and IoT devices that implement the CoAP protocol, which is designed for resource-constrained networks and devices. This makes the vulnerability particularly relevant for embedded systems and IoT deployments that rely on secure communication via TLS.

Potential Impact

The primary impact of CVE-2025-65495 is a denial of service condition caused by application crashes or service interruptions when processing malicious TLS certificates. For European organizations, especially those deploying IoT devices, smart city infrastructure, industrial control systems, or other constrained network environments using libcoap 4.3.5, this vulnerability poses a risk to operational continuity and availability. Disruptions could affect critical services such as energy management, transportation systems, healthcare devices, and building automation. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, potentially leading to network segmentation issues or cascading failures in interconnected systems. While confidentiality and integrity are not directly impacted, the loss of availability can have significant operational and financial consequences. The absence of known exploits in the wild offers a window for proactive mitigation, but the lack of patches necessitates immediate defensive measures. Organizations relying on CoAP-based communication should assess their exposure and prepare for incident response scenarios involving unexpected service outages.

Mitigation Recommendations

1. Monitor official libcoap repositories and security advisories closely for patches or updates addressing CVE-2025-65495 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed or suspicious TLS certificates that could exploit the vulnerability, using intrusion detection/prevention systems (IDS/IPS) with updated signatures. 3. Employ strict certificate validation policies and consider additional certificate sanity checks before passing certificates to vulnerable libcoap components. 4. Where feasible, isolate or segment IoT and constrained device networks to limit exposure to untrusted sources that might attempt exploitation. 5. Conduct thorough inventory and risk assessments to identify all systems using libcoap 4.3.5 and evaluate their exposure. 6. Develop and test incident response plans to quickly recover from potential denial of service incidents caused by this vulnerability. 7. Consider temporary mitigations such as disabling TLS certificate verification in controlled environments if acceptable, until patches are available. 8. Engage with vendors and device manufacturers to confirm their mitigation plans and timelines for addressing this vulnerability in embedded products.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692467ebff33e781bff0e366

Added to database: 11/24/2025, 2:12:59 PM

Last enriched: 12/1/2025, 2:42:28 PM

Last updated: 12/4/2025, 6:24:02 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats