Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65497: n/a

0
Medium
VulnerabilityCVE-2025-65497cvecve-2025-65497
Published: Mon Nov 24 2025 (11/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.

AI-Powered Analysis

AILast updated: 12/01/2025, 14:36:46 UTC

Technical Analysis

CVE-2025-65497 is a vulnerability identified in the OISM libcoap version 4.3.5, specifically within the coap_dtls_generate_cookie() function located in the src/coap_openssl.c file. The issue arises from a NULL pointer dereference triggered when the function SSL_get_SSL_CTX() returns NULL during a crafted Datagram Transport Layer Security (DTLS) handshake. This condition leads to a denial of service (DoS) by crashing the application or service relying on libcoap for DTLS-secured CoAP communications. The vulnerability stems from improper handling of SSL context pointers, classified under CWE-476 (NULL Pointer Dereference). The attack vector is network-based (AV:N), requiring no privileges (PR:N), but does require user interaction (UI:R) in the form of initiating a handshake. The scope is unchanged (S:U), and the impact is limited to availability (A:L) with no confidentiality or integrity loss. Libcoap is widely used in IoT and constrained environments for CoAP protocol implementations, often securing communications in smart devices and industrial control systems. The absence of patches and known exploits suggests this is a newly disclosed vulnerability, emphasizing the need for proactive monitoring and mitigation. The vulnerability could be exploited remotely by sending a specially crafted DTLS handshake packet to vulnerable devices, causing them to crash and disrupt service availability.

Potential Impact

The primary impact of CVE-2025-65497 is a denial of service condition on devices and applications using libcoap 4.3.5 with OpenSSL for DTLS. For European organizations, particularly those deploying IoT devices, smart city infrastructure, or industrial control systems that rely on CoAP for lightweight communication, this vulnerability could lead to service outages or degraded performance. Disruptions in critical infrastructure such as energy grids, transportation systems, or healthcare IoT devices could have cascading effects on operational continuity and safety. Additionally, repeated exploitation attempts could be used as part of larger denial of service campaigns targeting network segments. While the vulnerability does not compromise confidentiality or integrity, the availability impact could affect business operations and service reliability. The lack of authentication requirements lowers the barrier for attackers, increasing the risk of opportunistic exploitation. Organizations with large-scale deployments of vulnerable libcoap versions may face increased operational risk until mitigations or patches are applied.

Mitigation Recommendations

1. Monitor vendor advisories and apply patches or updates to libcoap as soon as they become available to address CVE-2025-65497. 2. Implement network-level filtering to detect and block malformed or suspicious DTLS handshake packets that could trigger the vulnerability. 3. Employ rate limiting on DTLS handshake attempts to reduce the risk of denial of service through repeated exploitation. 4. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous CoAP/DTLS traffic patterns. 5. Where possible, isolate vulnerable devices or services in segmented network zones to limit exposure. 6. Consider fallback mechanisms or redundancy in critical systems to maintain availability if a device is impacted. 7. Conduct regular security assessments and penetration testing focused on IoT and constrained device communications to identify similar weaknesses. 8. Educate operational technology and IoT teams about this vulnerability to ensure rapid incident response if exploitation is detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692467ebff33e781bff0e36e

Added to database: 11/24/2025, 2:12:59 PM

Last enriched: 12/1/2025, 2:36:46 PM

Last updated: 12/4/2025, 4:29:55 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats