Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification
Summary
| CVE | CVE-2025-14831 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-02-09 15:16:09 UTC |
| Updated | 2026-05-14 23:16:36 UTC |
| Description | A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs). |
Risk And Classification
Primary CVSS: v3.1 5.3 MEDIUM from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS: 0.000590000 probability, percentile 0.183080000 (date 2026-05-14)
Problem Types: CWE-407 | CWE-407 Inefficient Algorithmic Complexity
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 5.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
| 3.1 | CNA | CVSS | 5.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
LowCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Red Hat | Red Hat Enterprise Linux 10 | unaffected 0:3.8.10-3.el10_1 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 10.0 Extended Update Support | unaffected 0:3.8.9-9.el10_0.17 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8 | unaffected 0:3.6.16-8.el8_10.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8 | unaffected 0:3.6.16-8.el8_10.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9 | unaffected 0:3.8.3-10.el9_7 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9 | unaffected 0:3.8.3-10.el9_7 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9.2 Update Services For SAP Solutions | unaffected 0:3.7.6-21.el9_2.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9.4 Extended Update Support | unaffected 0:3.8.3-4.el9_4.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9.6 Extended Update Support | unaffected 0:3.8.3-6.el9_6.3 * rpm | Not specified |
| CNA | Red Hat | RHEL-8 Based Middleware Containers | unaffected 7.13.5-4.1777325677 * rpm | Not specified |
| CNA | Red Hat | RHEL-8 Based Middleware Containers | unaffected 7.13.5-4.1777325711 * rpm | Not specified |
| CNA | Red Hat | RHEL-8 Based Middleware Containers | unaffected 7.13.5-4.1777325710 * rpm | Not specified |
| CNA | Red Hat | RHEL-8 Based Middleware Containers | unaffected 7.13.5-3.1777325680 * rpm | Not specified |
| CNA | Red Hat | RHEL-8 Based Middleware Containers | unaffected 7.13.5-4.1777325709 * rpm | Not specified |
| CNA | Red Hat | RHEL-8 Based Middleware Containers | unaffected 7.13.5-4.1777325680 * rpm | Not specified |
| CNA | Red Hat | RHEL-8 Based Middleware Containers | unaffected 7.13.5-4.1777325708 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.2 | unaffected 1775740563 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.3 | unaffected 1778244559 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.3 | unaffected 1778244531 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.3 | unaffected 1778244546 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.3 | unaffected 1775680192 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.3 | unaffected 1775680262 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.3 | unaffected 1775749857 * rpm | Not specified |
| CNA | Red Hat | Red Hat Ceph Storage 8 | unaffected 1774002867 * rpm | Not specified |
| CNA | Red Hat | Red Hat Discovery 2 | unaffected 1775668717 * rpm | Not specified |
| CNA | Red Hat | Red Hat Discovery 2 | unaffected 1775675922 * rpm | Not specified |
| CNA | Red Hat | Red Hat Hardened Images | unaffected 3.8.12-1.1.hum1 * rpm | Not specified |
| CNA | Red Hat | Red Hat Insights Proxy 1.5 | unaffected 1773685509 * rpm | Not specified |
| CNA | Red Hat | Red Hat Update Infrastructure 5 | unaffected 1773670073 * rpm | Not specified |
| CNA | Red Hat | Red Hat Update Infrastructure 5 | unaffected 1773672059 * rpm | Not specified |
| CNA | Red Hat | Red Hat Update Infrastructure 5 | unaffected 1773668803 * rpm | Not specified |
| CNA | Red Hat | Red Hat Update Infrastructure 5 | unaffected 1773670137 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 6 | Not specified | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 7 | Not specified | Not specified |
| CNA | Red Hat | Red Hat OpenShift Container Platform 4 | Not specified | Not specified |
| ADP | Siemens | SIMATIC CN 4100 | affected V5.0 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| access.redhat.com/errata/RHSA-2026:6618 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:5606 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:16009 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:16008 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:8747 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:6738 | [email protected] | access.redhat.com | |
| bugzilla.redhat.com/show_bug.cgi | [email protected] | bugzilla.redhat.com | |
| access.redhat.com/errata/RHSA-2026:4188 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:7329 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:8748 | [email protected] | access.redhat.com | |
| cert-portal.siemens.com/productcert/html/ssa-032379.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| access.redhat.com/errata/RHSA-2026:6630 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:6737 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:4943 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:4655 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:16174 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:3477 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:7335 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:13812 | [email protected] | access.redhat.com | |
| gitlab.com/gnutls/gnutls/-/issues/1773 | [email protected] | gitlab.com | |
| access.redhat.com/security/cve/CVE-2025-14831 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:8746 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:7477 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:5585 | [email protected] | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2025-12-17T14:48:30.222Z | Reported to Red Hat. |
| CNA | 2026-02-09T14:26:34.939Z | Made public. |
There are currently no legacy QID mappings associated with this CVE.