{"api_version":"1","generated_at":"2026-05-13T03:12:07+00:00","cve":"CVE-2025-9232","urls":{"html":"https://cve.report/CVE-2025-9232","api":"https://cve.report/api/cve/CVE-2025-9232.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-9232","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-9232"},"summary":{"title":"Out-of-bounds read in HTTP client no_proxy handling","description":"Issue summary: An application using the OpenSSL HTTP client API functions may\ntrigger an out-of-bounds read if the 'no_proxy' environment variable is set and\nthe host portion of the authority component of the HTTP URL is an IPv6 address.\n\nImpact summary: An out-of-bounds read can trigger a crash which leads to\nDenial of Service for an application.\n\nThe OpenSSL HTTP client API functions can be used directly by applications\nbut they are also used by the OCSP client functions and CMP (Certificate\nManagement Protocol) client implementation in OpenSSL. However the URLs used\nby these implementations are unlikely to be controlled by an attacker.\n\nIn this vulnerable code the out of bounds read can only trigger a crash.\nFurthermore the vulnerability requires an attacker-controlled URL to be\npassed from an application to the OpenSSL function and the user has to have\na 'no_proxy' environment variable set. For the aforementioned reasons the\nissue was assessed as Low severity.\n\nThe vulnerable code was introduced in the following patch releases:\n3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the HTTP client implementation is outside the OpenSSL FIPS module\nboundary.","state":"PUBLISHED","assigner":"openssl","published_at":"2025-09-30 14:15:41","updated_at":"2026-05-12 13:17:30"},"problem_types":["CWE-125","CWE-125 CWE-125 Out-of-bounds Read"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"5.9","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"5.9","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-089022.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-089022.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/openssl/openssl/commit/7cf21a30513c9e43c4bc3836c237cf086e194af3","name":"https://github.com/openssl/openssl/commit/7cf21a30513c9e43c4bc3836c237cf086e194af3","refsource":"openssl-security@openssl.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://openssl-library.org/news/secadv/20250930.txt","name":"https://openssl-library.org/news/secadv/20250930.txt","refsource":"openssl-security@openssl.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2025/09/30/5","name":"http://www.openwall.com/lists/oss-security/2025/09/30/5","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/openssl/openssl/commit/bbf38c034cdabd0a13330abcc4855c866f53d2e0","name":"https://github.com/openssl/openssl/commit/bbf38c034cdabd0a13330abcc4855c866f53d2e0","refsource":"openssl-security@openssl.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/openssl/openssl/commit/654dc11d23468a74fc8ea4672b702dd3feb7be4b","name":"https://github.com/openssl/openssl/commit/654dc11d23468a74fc8ea4672b702dd3feb7be4b","refsource":"openssl-security@openssl.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/openssl/openssl/commit/2b4ec20e47959170422922eaff25346d362dcb35","name":"https://github.com/openssl/openssl/commit/2b4ec20e47959170422922eaff25346d362dcb35","refsource":"openssl-security@openssl.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-485750.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-485750.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/openssl/openssl/commit/89e790ac431125a4849992858490bed6b225eadf","name":"https://github.com/openssl/openssl/commit/89e790ac431125a4849992858490bed6b225eadf","refsource":"openssl-security@openssl.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-9232","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-9232","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"OpenSSL","product":"OpenSSL","version":"affected 3.5.0 3.5.4 semver","platforms":[]},{"source":"CNA","vendor":"OpenSSL","product":"OpenSSL","version":"affected 3.4.0 3.4.3 semver","platforms":[]},{"source":"CNA","vendor":"OpenSSL","product":"OpenSSL","version":"affected 3.3.3 3.3.5 semver","platforms":[]},{"source":"CNA","vendor":"OpenSSL","product":"OpenSSL","version":"affected 3.2.4 3.2.6 semver","platforms":[]},{"source":"CNA","vendor":"OpenSSL","product":"OpenSSL","version":"affected 3.0.16 3.0.18 semver","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"RUGGEDCOM RST2428P","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XCH328","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XCM324","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XCM328","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XCM332","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRH334 (24 V DC, 8xFO, CC)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (230 V AC, 12xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (230 V AC, 8xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (24 V DC, 12xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (24 V DC, 8xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (2x230 V AC, 12xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (2x230 V AC, 8xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIDIS Prime","version":"affected V4.0.800 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC CN 4100","version":"affected V5.0 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","version":"affected V3.1.5 * custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","version":"affected V3.1.5 * custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","version":"affected V3.1.5 * custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","version":"affected V3.1.5 * custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPLUS S7-1500 CPU 1518-4 PN/DP MFP","version":"affected V3.1.5 * custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Stanislav Fort (Aisle Research)","lang":"en"},{"source":"CNA","value":"Stanislav Fort (Aisle Research)","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2025","cve_id":"9232","cve":"CVE-2025-9232","epss":"0.000390000","percentile":"0.117310000","score_date":"2026-05-12","updated_at":"2026-05-13 00:11:53"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2025-9232","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-09-30T19:22:31.407504Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2025-09-30T19:22:35.483Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2025-11-04T21:15:19.948Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"http://www.openwall.com/lists/oss-security/2025/09/30/5"}],"title":"CVE Program Container"},{"affected":[{"defaultStatus":"unknown","product":"RUGGEDCOM RST2428P","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XCH328","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XCM324","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XCM328","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XCM332","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRH334 (24 V DC, 8xFO, CC)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (230 V AC, 12xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (230 V AC, 8xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (24 V DC, 12xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (24 V DC, 8xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (2x230 V AC, 12xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (2x230 V AC, 8xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIDIS Prime","vendor":"Siemens","versions":[{"lessThan":"V4.0.800","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIMATIC CN 4100","vendor":"Siemens","versions":[{"lessThan":"V5.0","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","vendor":"Siemens","versions":[{"lessThan":"*","status":"affected","version":"V3.1.5","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","vendor":"Siemens","versions":[{"lessThan":"*","status":"affected","version":"V3.1.5","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","vendor":"Siemens","versions":[{"lessThan":"*","status":"affected","version":"V3.1.5","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","vendor":"Siemens","versions":[{"lessThan":"*","status":"affected","version":"V3.1.5","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPLUS S7-1500 CPU 1518-4 PN/DP MFP","vendor":"Siemens","versions":[{"lessThan":"*","status":"affected","version":"V3.1.5","versionType":"custom"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T12:02:42.508Z","orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP"},"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-089022.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-485750.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html"}],"x_adpType":"supplier"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"OpenSSL","vendor":"OpenSSL","versions":[{"lessThan":"3.5.4","status":"affected","version":"3.5.0","versionType":"semver"},{"lessThan":"3.4.3","status":"affected","version":"3.4.0","versionType":"semver"},{"lessThan":"3.3.5","status":"affected","version":"3.3.3","versionType":"semver"},{"lessThan":"3.2.6","status":"affected","version":"3.2.4","versionType":"semver"},{"lessThan":"3.0.18","status":"affected","version":"3.0.16","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"Stanislav Fort (Aisle Research)"},{"lang":"en","type":"remediation developer","value":"Stanislav Fort (Aisle Research)"}],"datePublic":"2025-09-30T14:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Issue summary: An application using the OpenSSL HTTP client API functions may<br>trigger an out-of-bounds read if the 'no_proxy' environment variable is set and<br>the host portion of the authority component of the HTTP URL is an IPv6 address.<br><br>Impact summary: An out-of-bounds read can trigger a crash which leads to<br>Denial of Service for an application.<br><br>The OpenSSL HTTP client API functions can be used directly by applications<br>but they are also used by the OCSP client functions and CMP (Certificate<br>Management Protocol) client implementation in OpenSSL. However the URLs used<br>by these implementations are unlikely to be controlled by an attacker.<br><br>In this vulnerable code the out of bounds read can only trigger a crash.<br>Furthermore the vulnerability requires an attacker-controlled URL to be<br>passed from an application to the OpenSSL function and the user has to have<br>a 'no_proxy' environment variable set. For the aforementioned reasons the<br>issue was assessed as Low severity.<br><br>The vulnerable code was introduced in the following patch releases:<br>3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.<br><br>The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br>issue, as the HTTP client implementation is outside the OpenSSL FIPS module<br>boundary."}],"value":"Issue summary: An application using the OpenSSL HTTP client API functions may\ntrigger an out-of-bounds read if the 'no_proxy' environment variable is set and\nthe host portion of the authority component of the HTTP URL is an IPv6 address.\n\nImpact summary: An out-of-bounds read can trigger a crash which leads to\nDenial of Service for an application.\n\nThe OpenSSL HTTP client API functions can be used directly by applications\nbut they are also used by the OCSP client functions and CMP (Certificate\nManagement Protocol) client implementation in OpenSSL. However the URLs used\nby these implementations are unlikely to be controlled by an attacker.\n\nIn this vulnerable code the out of bounds read can only trigger a crash.\nFurthermore the vulnerability requires an attacker-controlled URL to be\npassed from an application to the OpenSSL function and the user has to have\na 'no_proxy' environment variable set. For the aforementioned reasons the\nissue was assessed as Low severity.\n\nThe vulnerable code was introduced in the following patch releases:\n3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the HTTP client implementation is outside the OpenSSL FIPS module\nboundary."}],"metrics":[{"format":"other","other":{"content":{"text":"Low"},"type":"https://openssl-library.org/policies/general/security-policy/"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-125","description":"CWE-125 Out-of-bounds Read","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-09-30T13:17:19.172Z","orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl"},"references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory"],"url":"https://openssl-library.org/news/secadv/20250930.txt"},{"name":"3.5.4 git commit","tags":["patch"],"url":"https://github.com/openssl/openssl/commit/2b4ec20e47959170422922eaff25346d362dcb35"},{"name":"3.4.3 git commit","tags":["patch"],"url":"https://github.com/openssl/openssl/commit/7cf21a30513c9e43c4bc3836c237cf086e194af3"},{"name":"3.3.5 git commit","tags":["patch"],"url":"https://github.com/openssl/openssl/commit/bbf38c034cdabd0a13330abcc4855c866f53d2e0"},{"name":"3.2.6 git commit","tags":["patch"],"url":"https://github.com/openssl/openssl/commit/89e790ac431125a4849992858490bed6b225eadf"},{"name":"3.0.18 git commit","tags":["patch"],"url":"https://github.com/openssl/openssl/commit/654dc11d23468a74fc8ea4672b702dd3feb7be4b"}],"source":{"discovery":"UNKNOWN"},"title":"Out-of-bounds read in HTTP client no_proxy handling","x_generator":{"engine":"Vulnogram 0.2.0"}}},"cveMetadata":{"assignerOrgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","assignerShortName":"openssl","cveId":"CVE-2025-9232","datePublished":"2025-09-30T13:17:19.172Z","dateReserved":"2025-08-20T08:38:12.019Z","dateUpdated":"2026-05-12T12:02:42.508Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2025-09-30 14:15:41","lastModifiedDate":"2026-05-12 13:17:30","problem_types":["CWE-125","CWE-125 CWE-125 Out-of-bounds Read"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"9232","Ordinal":"1","Title":"Out-of-bounds read in HTTP client no_proxy handling","CVE":"CVE-2025-9232","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"9232","Ordinal":"1","NoteData":"Issue summary: An application using the OpenSSL HTTP client API functions may\ntrigger an out-of-bounds read if the 'no_proxy' environment variable is set and\nthe host portion of the authority component of the HTTP URL is an IPv6 address.\n\nImpact summary: An out-of-bounds read can trigger a crash which leads to\nDenial of Service for an application.\n\nThe OpenSSL HTTP client API functions can be used directly by applications\nbut they are also used by the OCSP client functions and CMP (Certificate\nManagement Protocol) client implementation in OpenSSL. However the URLs used\nby these implementations are unlikely to be controlled by an attacker.\n\nIn this vulnerable code the out of bounds read can only trigger a crash.\nFurthermore the vulnerability requires an attacker-controlled URL to be\npassed from an application to the OpenSSL function and the user has to have\na 'no_proxy' environment variable set. For the aforementioned reasons the\nissue was assessed as Low severity.\n\nThe vulnerable code was introduced in the following patch releases:\n3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the HTTP client implementation is outside the OpenSSL FIPS module\nboundary.","Type":"Description","Title":"Out-of-bounds read in HTTP client no_proxy handling"}]}}}