CVE-2025-11602
BaseFortify
Publication date: 2025-10-31
Last updated on: 2025-11-04
Assigner: Neo4j
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| neo4j | neo4j | 5.26.14 |
| neo4j | neo4j | 2025.10.0 |
| neo4j | neo4j | 2025.1.0 |
| neo4j | neo4j | 5.26.0 |
| neo4j | neo4j | 2025.10.1 |
| neo4j | neo4j | 5.26.15 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-226 | The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-11602 is a vulnerability in Neo4j Community and Enterprise editions where during the Bolt protocol handshake, an attacker can potentially obtain one byte of information from previous connections. The attacker does not have control over what specific information is leaked in the server responses. [1]
How can this vulnerability impact me? :
This vulnerability can lead to a minor information leak, allowing an attacker to gain a small amount of data (one byte) from previous connections. Although the attacker cannot control the leaked information, this could potentially aid in further attacks or reconnaissance against the system. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade Neo4j Community and Enterprise editions to versions 5.26.15 or 2025.10.1 or later, as these versions contain the fix for the information leak during the Bolt protocol handshake. [1]