Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66030: CWE-190: Integer Overflow or Wraparound in digitalbazaar forge

0
Medium
VulnerabilityCVE-2025-66030cvecve-2025-66030cwe-190
Published: Wed Nov 26 2025 (11/26/2025, 22:23:41 UTC)
Source: CVE Database V5
Vendor/Project: digitalbazaar
Product: forge

Description

CVE-2025-66030 is an integer overflow vulnerability in node-forge versions prior to 1. 3. 2, a JavaScript implementation of TLS. The flaw allows remote, unauthenticated attackers to craft ASN. 1 structures with oversized OID arcs that are truncated due to 32-bit bitwise operations, causing downstream security decisions based on OIDs to be bypassed. This can lead to improper trust decisions in cryptographic operations. The vulnerability has a CVSS score of 6. 3 (medium severity) and does not require user interaction or privileges to exploit. It affects systems using node-forge versions below 1. 3.

AI-Powered Analysis

AILast updated: 11/26/2025, 22:55:21 UTC

Technical Analysis

CVE-2025-66030 is an integer overflow vulnerability classified under CWE-190 found in the node-forge library, a native JavaScript implementation of Transport Layer Security (TLS). The vulnerability exists in node-forge versions 1.3.1 and earlier, where ASN.1 structures containing Object Identifiers (OIDs) with oversized arcs can be crafted by remote attackers. Due to 32-bit bitwise truncation during decoding, these oversized arcs are interpreted as smaller, trusted OIDs, effectively bypassing security checks that rely on OID validation. This can undermine the integrity of cryptographic operations, such as certificate validation or policy enforcement, potentially allowing attackers to impersonate trusted entities or bypass security controls. Exploitation requires no authentication or user interaction and can be performed remotely by sending malicious ASN.1 data to affected systems. The vulnerability was publicly disclosed on November 26, 2025, with a CVSS v4.0 base score of 6.3, indicating medium severity. The issue has been addressed in node-forge version 1.3.2, which corrects the integer overflow and ensures proper OID arc validation. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations, the impact of CVE-2025-66030 can be significant, especially for those relying on node-forge for TLS implementations, cryptographic operations, or certificate validation in web applications, APIs, or internal services. The vulnerability could allow attackers to bypass OID-based security policies, potentially leading to unauthorized access, man-in-the-middle attacks, or the acceptance of malicious certificates. This undermines confidentiality and integrity of communications and data. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that depend on strong cryptographic assurances are particularly at risk. The medium severity score reflects a moderate likelihood of exploitation combined with impactful consequences if exploited. Since no authentication or user interaction is required, the attack surface is broad, increasing the risk to exposed services. However, the absence of known exploits in the wild suggests that immediate widespread attacks are not yet observed, though proactive mitigation is essential.

Mitigation Recommendations

1. Immediately upgrade all instances of node-forge to version 1.3.2 or later to apply the official patch addressing the integer overflow. 2. Audit all applications and services using node-forge to identify and remediate any usage of vulnerable versions. 3. Implement strict input validation and ASN.1 parsing controls where possible to detect and reject malformed or oversized OID arcs. 4. Employ network-level protections such as Web Application Firewalls (WAFs) with custom rules to detect anomalous ASN.1 structures in inbound traffic. 5. Monitor logs and network traffic for unusual TLS handshake anomalies or certificate validation errors that may indicate exploitation attempts. 6. Educate developers and security teams about the risks of integer overflow vulnerabilities in cryptographic libraries and encourage secure coding practices. 7. Consider additional cryptographic validation layers or alternative libraries if node-forge usage is extensive and critical. 8. Maintain an incident response plan to quickly address any exploitation attempts once detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-21T01:08:02.614Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692781c3d322a87b22e508d4

Added to database: 11/26/2025, 10:40:03 PM

Last enriched: 11/26/2025, 10:55:21 PM

Last updated: 11/26/2025, 11:52:32 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats