CVE-2025-11602
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-31

Last updated on: 2025-11-04

Assigner: Neo4j

Description
Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-10-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
neo4j neo4j 5.26.14
neo4j neo4j 2025.10.0
neo4j neo4j 2025.1.0
neo4j neo4j 5.26.0
neo4j neo4j 2025.10.1
neo4j neo4j 5.26.15
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-226 The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-11602 is a vulnerability in Neo4j Community and Enterprise editions where during the Bolt protocol handshake, an attacker can potentially obtain one byte of information from previous connections. The attacker does not have control over what specific information is leaked in the server responses. [1]


How can this vulnerability impact me? :

This vulnerability can lead to a minor information leak, allowing an attacker to gain a small amount of data (one byte) from previous connections. Although the attacker cannot control the leaked information, this could potentially aid in further attacks or reconnaissance against the system. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade Neo4j Community and Enterprise editions to versions 5.26.15 or 2025.10.1 or later, as these versions contain the fix for the information leak during the Bolt protocol handshake. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart