Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2025-4575

Description

Issue summary: Use of -addreject option with the openssl x509 application addsa trusted use instead of a rejected use for a certificate.Impact summary: If a user intends to make a trusted certificate rejected fora particular use it will be instead marked as trusted for that use.A copy & paste error during minor refactoring of the code introduced thisissue in the OpenSSL 3.5 version. If, for example, a trusted CA certificateshould be trusted only for the purpose of authenticating TLS servers but notfor CMS signature verification and the CMS signature verification is intendedto be marked as rejected with the -addreject option, the resulting CAcertificate will be trusted for CMS signature verification purpose instead.Only users which use the trusted certificate format who use the openssl x509command line application to add rejected uses are affected by this issue.The issues affecting only the command line application are considered tobe Low severity.The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by thisissue.OpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by thisissue.

POC

Reference

No PoCs from references.

Github

- https://github.com/chnzzh/OpenSSL-CVE-lib

- https://github.com/kaisensan/desafio-girus-pick