CVE-2025-68972
Unknown Unknown - Not Provided
Signature Bypass in GnuPG via Malformed Signed Message Line

Publication date: 2025-12-27

Last updated on: 2025-12-27

Assigner: MITRE

Description
In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-27
Last Modified
2025-12-27
Generated
2026-05-07
AI Q&A
2025-12-28
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gnupg gnupg 2.4.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-347 The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in GnuPG through version 2.4.8 involves a flaw where if a signed message contains a form feed character (\f) at the end of a plaintext line, an attacker can create a modified message that appends additional text after the signed content. Despite this modification, the signature verification process incorrectly succeeds, although it prints an "invalid armor" warning during verification. This happens because \f is used as a marker to indicate truncation of a long plaintext line.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to alter a signed message by appending extra content after the originally signed material without causing the signature verification to fail. This means the integrity of signed messages can be compromised, potentially leading to acceptance of tampered messages as authentic, which can undermine trust and security in communications.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart