Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2025-49601

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 15.0%
CVSS Severity
CVSS v3 Score 4.8
Products affected by CVE-2025-49601
  • Arm » Mbed Tls » Version: 3.3.0
    cpe:2.3:a:arm:mbed_tls:3.3.0
  • Arm » Mbed Tls » Version: 3.4.0
    cpe:2.3:a:arm:mbed_tls:3.4.0
  • Arm » Mbed Tls » Version: 3.4.1
    cpe:2.3:a:arm:mbed_tls:3.4.1
  • Arm » Mbed Tls » Version: 3.5.0
    cpe:2.3:a:arm:mbed_tls:3.5.0
  • Arm » Mbed Tls » Version: 3.5.1
    cpe:2.3:a:arm:mbed_tls:3.5.1
  • Arm » Mbed Tls » Version: 3.5.2
    cpe:2.3:a:arm:mbed_tls:3.5.2
  • Arm » Mbed Tls » Version: 3.6.0
    cpe:2.3:a:arm:mbed_tls:3.6.0
  • Arm » Mbed Tls » Version: 3.6.1
    cpe:2.3:a:arm:mbed_tls:3.6.1
  • Arm » Mbed Tls » Version: 3.6.2
    cpe:2.3:a:arm:mbed_tls:3.6.2
  • Arm » Mbed Tls » Version: 3.6.3
    cpe:2.3:a:arm:mbed_tls:3.6.3


Contact Us

Shodan ® - All rights reserved