- CVE ID
- CVE-2025-24970
- CVE Description
- Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.
- Published
- Feb 11, 2025
- CVSS Score & Severity
7.5High
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- EPSS Score
- 0.953%
- KEV Status
Not in KEV Catalog: No known exploits
- Vulnerable Methods
io/netty/handler/ssl/ReferenceCountedOpenSslEngine.unwrap([Ljava/nio/ByteBuffer;II[Ljava/nio/ByteBuffer;II)Ljavax/net/ssl/SSLEngineResult;JVM
io/netty/handler/ssl/SslUtils.getEncryptedPacketLength(Ljava/nio/ByteBuffer;)IJVMVulnerable params: 0
- Source
- National Vulnerability Database