CVE-2025-32910

6.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in libsoup's soup_auth_digest_authenticate() function can cause client applications to crash when processing malformed authentication responses. This affects any application using libsoup for HTTP client functionality with digest authentication. The vulnerability is triggered by specific server responses during authentication.

💻 Affected Systems

Products:
  • libsoup
  • Applications using libsoup library
Versions: libsoup versions before 3.4.6
Operating Systems: Linux distributions including Red Hat, Debian, Ubuntu, Any OS running affected libsoup versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using libsoup's HTTP client functionality with digest authentication enabled; servers using libsoup are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Denial of service causing libsoup-based applications to crash repeatedly, potentially disrupting critical client functionality that relies on HTTP communication.

🟠

Likely Case

Intermittent crashes of libsoup client applications when connecting to servers that send malformed digest authentication responses, leading to service disruption.

🟢

If Mitigated

Minimal impact with proper input validation and crash recovery mechanisms in place; applications may experience brief interruptions but can recover automatically.

🌐 Internet-Facing: MEDIUM - Exploitation requires a malicious server response during authentication, which could come from compromised or malicious internet servers that clients connect to.
🏢 Internal Only: LOW - Internal servers are less likely to send malicious authentication responses unless compromised; risk primarily exists when connecting to untrusted external servers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires control over server responses during digest authentication; attacker needs to be in position to send malformed authentication responses to vulnerable clients.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: libsoup 3.4.6 and later

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2025-32910

Restart Required: Yes

Instructions:

1. Update libsoup package using system package manager. 2. For Red Hat systems: 'yum update libsoup'. 3. For Debian/Ubuntu: 'apt update && apt upgrade libsoup3.0'. 4. Restart affected applications using libsoup.

🔧 Temporary Workarounds

Disable Digest Authentication

all

Configure applications to avoid using digest authentication where possible

Application-specific configuration; check documentation for disabling digest auth

Network Filtering

linux

Restrict client connections to trusted servers only

iptables -A OUTPUT -p tcp --dport 80 -d trusted_server_ip -j ACCEPT
iptables -A OUTPUT -p tcp --dport 443 -d trusted_server_ip -j ACCEPT
iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement application-level crash recovery and restart mechanisms
  • Monitor for application crashes and investigate connections to untrusted servers

🔍 How to Verify

Check if Vulnerable:

Check libsoup version: 'pkg-config --modversion libsoup-3.0' or 'rpm -q libsoup' or 'dpkg -l | grep libsoup'

Check Version:

pkg-config --modversion libsoup-3.0

Verify Fix Applied:

Verify version is 3.4.6 or higher: 'pkg-config --modversion libsoup-3.0' should show >=3.4.6

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation fault in libsoup functions
  • Stack traces showing soup_auth_digest_authenticate()

Network Indicators:

  • HTTP 401 responses with malformed WWW-Authenticate headers
  • Unusual authentication failures from specific servers

SIEM Query:

process.name:application_name AND event.type:crash AND stack_trace:*soup_auth_digest_authenticate*

🔗 References

📤 Share & Export