CVE-2025-67897
Panic Vulnerability in Sequoia aes_key_unwrap Allows Remote Crash
Publication date: 2025-12-14
Last updated on: 2025-12-14
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sequoia | sequoia | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-195 | The product uses a signed primitive and performs a cast to an unsigned primitive, which can produce an unexpected value if the value of the signed primitive can not be represented using an unsigned primitive. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for application crashes or panics in the sequoia-openpgp library when processing encrypted messages, especially those containing PKESK or SKESK packets. There are no specific commands provided in the resources to detect this vulnerability on a network or system. However, inspecting logs for crashes related to aes_key_unwrap or unusual memory allocation failures during decryption attempts may help identify exploitation attempts. [1, 3]
Can you explain this vulnerability to me?
This vulnerability occurs in Sequoia versions before 2.1.0 where the function aes_key_unwrap panics if it receives a ciphertext that is too short. A remote attacker can exploit this by sending a specially crafted encrypted message with a PKESK or SKESK packet, causing the application to crash.
How can this vulnerability impact me? :
The vulnerability can be exploited by a remote attacker to crash an application, leading to a denial of service condition. This can disrupt availability of the affected service or application.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade the sequoia-openpgp library to version 2.1.0 or later, where the vulnerability in aes_key_unwrap has been fixed. Avoid processing untrusted encrypted messages containing PKESK or SKESK packets until the update is applied to prevent denial-of-service crashes. [1, 3]