CVE-2025-15468
📋 TL;DR
A NULL pointer dereference vulnerability in OpenSSL's SSL_CIPHER_find() function when used with QUIC protocol allows denial of service attacks. Applications using OpenSSL 3.2+ with QUIC support that call this function from client_hello_cb are affected. The vulnerability causes abnormal process termination when receiving unknown cipher suites from peers.
💻 Affected Systems
- OpenSSL
📦 What is this software?
Openssl by Openssl
OpenSSL is a robust, commercial-grade toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It provides cryptographic functions and is one of the most widely used libraries for implementing secure communications in applications worldwide.
Learn more about Openssl →Openssl by Openssl
OpenSSL is a robust, commercial-grade toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It provides cryptographic functions and is one of the most widely used libraries for implementing secure communications in applications worldwide.
Learn more about Openssl →Openssl by Openssl
OpenSSL is a robust, commercial-grade toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It provides cryptographic functions and is one of the most widely used libraries for implementing secure communications in applications worldwide.
Learn more about Openssl →Openssl by Openssl
OpenSSL is a robust, commercial-grade toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It provides cryptographic functions and is one of the most widely used libraries for implementing secure communications in applications worldwide.
Learn more about Openssl →⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service causing application crashes and service unavailability
Likely Case
Intermittent service disruptions when malicious clients send malformed cipher suites
If Mitigated
No impact if applications don't use QUIC or don't call SSL_CIPHER_find() from client_hello_cb
🎯 Exploit Status
Exploitation requires sending malformed cipher suites to applications with specific QUIC configurations. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in latest releases of affected versions
Vendor Advisory: https://openssl-library.org/news/secadv/20260127.txt
Restart Required: Yes
Instructions:
1. Update OpenSSL to latest patched version for your release (3.6, 3.5, 3.4, or 3.3). 2. Recompile applications against updated OpenSSL. 3. Restart affected services.
🔧 Temporary Workarounds
Disable QUIC protocol
allIf QUIC is not required, disable it in application configuration
Configure application to use TLS instead of QUIC
Avoid SSL_CIPHER_find() in client_hello_cb
allModify application code to not call SSL_CIPHER_find() from client_hello_cb callback
Review and modify application source code
🧯 If You Can't Patch
- Implement network filtering to block malformed QUIC packets
- Deploy application-level monitoring and automatic restart mechanisms
🔍 How to Verify
Check if Vulnerable:
Check OpenSSL version with 'openssl version' and verify if application uses QUIC and calls SSL_CIPHER_find() from client_hello_cb
Check Version:
openssl version
Verify Fix Applied:
Verify OpenSSL version is updated and test application with malformed cipher suites to ensure no crashes
📡 Detection & Monitoring
Log Indicators:
- Application crashes with segmentation faults
- Abnormal termination of QUIC-enabled services
- Error logs mentioning NULL pointer dereference
Network Indicators:
- Unusual QUIC handshake patterns
- Malformed cipher suite IDs in network traffic
SIEM Query:
process:terminated AND (error:segmentation_fault OR error:null_pointer) AND protocol:quic
🔗 References
- https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65
- https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2
- https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4
- https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7
- https://openssl-library.org/news/secadv/20260127.txt