CVE-2025-67897

5.3 MEDIUM

📋 TL;DR

This vulnerability in Sequoia PGP library versions before 2.1.0 allows remote attackers to crash applications by sending specially crafted encrypted messages. The aes_key_unwrap function panics when processing ciphertext that is too short, leading to denial of service. Any application using vulnerable Sequoia versions for PGP decryption is affected.

💻 Affected Systems

Products:
  • Sequoia PGP library
Versions: All versions before 2.1.0
Operating Systems: All platforms running Sequoia
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using Sequoia for PGP decryption of PKESK or SKESK packets is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to denial of service, potentially disrupting critical services that rely on PGP decryption.

🟠

Likely Case

Application crashes when processing malicious PGP messages, causing service disruption until restart.

🟢

If Mitigated

Minimal impact with proper input validation and error handling in place.

🌐 Internet-Facing: MEDIUM - Remote attackers can trigger crashes but only cause denial of service, not data compromise.
🏢 Internal Only: LOW - Requires internal attackers with ability to send crafted messages to vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires sending crafted encrypted messages to vulnerable applications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.0

Vendor Advisory: https://gitlab.com/sequoia-pgp/sequoia/-/blob/b59886e5e7bdf7169ed330f309a6633d131776e5/openpgp/NEWS#L7-L26

Restart Required: Yes

Instructions:

1. Update Sequoia to version 2.1.0 or later. 2. Rebuild applications using Sequoia. 3. Restart affected services.

🔧 Temporary Workarounds

Input validation wrapper

all

Add custom validation to check ciphertext length before passing to aes_key_unwrap

Implement pre-processing to validate PKESK/SKESK packet sizes

🧯 If You Can't Patch

  • Implement network filtering to block suspicious PGP messages
  • Monitor application logs for panic/crash events and implement automatic restart

🔍 How to Verify

Check if Vulnerable:

Check Sequoia version in dependencies or run: cargo tree | grep sequoia

Check Version:

cargo tree | grep sequoia-openpgp

Verify Fix Applied:

Verify Sequoia version is 2.1.0 or later: cargo tree | grep sequoia-openpgp

📡 Detection & Monitoring

Log Indicators:

  • Application panic logs mentioning aes_key_unwrap
  • Process crashes during PGP decryption

Network Indicators:

  • Incoming PGP messages with unusually small ciphertext

SIEM Query:

process:panic AND message:aes_key_unwrap

🔗 References

📤 Share & Export