CVE-2025-49601

In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.
Configurations

Configuration 1 (hide)

cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*

History

17 Jul 2025, 16:00

Type Values Removed Values Added
First Time Arm
Arm mbed Tls
CPE cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
References () https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-4.md - () https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-4.md - Third Party Advisory

08 Jul 2025, 16:18

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-04 15:15

Updated : 2025-07-17 16:00


NVD link : CVE-2025-49601

Mitre link : CVE-2025-49601

CVE.ORG link : CVE-2025-49601


JSON object : View

Products Affected

arm

  • mbed_tls
CWE
CWE-125

Out-of-bounds Read