CVE-2025-61730

Source
https://cve.org/CVERecord?id=CVE-2025-61730
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-61730.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-61730
Aliases
Downstream
Related
Published
2026-01-28T19:30:30.986Z
Modified
2026-05-15T04:14:07.974708704Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Handshake messages may be processed at the incorrect encryption level in crypto/tls
Details

During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "AFFECTED_FIELD",
            "extracted_events": [
                {
                    "fixed": "1.24.12"
                },
                {
                    "introduced": "1.25.0"
                },
                {
                    "fixed": "1.25.6"
                }
            ]
        }
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/61xxx/CVE-2025-61730.json",
    "cna_assigner": "Go"
}
References

Affected packages