{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T11:45:54.481","vulnerabilities":[{"cve":{"id":"CVE-2025-13470","sourceIdentifier":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3","published":"2025-11-21T17:15:50.473","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In RNP version 0.18.0 a refactoring regression causes the symmetric \nsession key used for Public-Key Encrypted Session Key (PKESK) packets to\n be left uninitialized except for zeroing, resulting in it always being \nan all-zero byte array.\n\nAny data encrypted using public-key encryption \nin this release can be decrypted trivially by supplying an all-zero \nsession key, fully compromising confidentiality.\n\nThe vulnerability affects only public key encryption (PKESK packets).  Passphrase-based encryption (SKESK packets) is not affected.\n\nRoot cause: Vulnerable session key buffer used in PKESK packet generation.\n\n\n\nThe defect was introduced in commit `7bd9a8dc356aae756b40755be76d36205b6b161a` where initialization \nlogic inside `encrypted_build_skesk()` only randomized the key for the \nSKESK path and omitted it for the PKESK path."}],"metrics":{"cvssMetricV40":[{"source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:H/U:Red","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"RED"}}],"cvssMetricV31":[{"source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3","type":"Secondary","description":[{"lang":"en","value":"CWE-330"}]}],"references":[{"url":"https://access.redhat.com/security/cve/cve-2025-13402","source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3"},{"url":"https://aur.archlinux.org/packages/rnp","source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2415863","source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3"},{"url":"https://github.com/rnpgp/rnp/commit/7bd9a8dc356aae756b40755be76d36205b6b161a","source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3"},{"url":"https://github.com/rnpgp/rnp/releases/tag/v0.18.1","source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3"},{"url":"https://launchpad.net/ubuntu/+source/rnp","source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3"},{"url":"https://open.ribose.com/advisories/ra-2025-11-20/","source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3"},{"url":"https://packages.gentoo.org/packages/dev-util/librnp","source":"6504adb2-f5e9-4c9b-9eda-5e19c93bd9b3"}]}}]}