{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T17:43:05.273","vulnerabilities":[{"cve":{"id":"CVE-2025-49601","sourceIdentifier":"cve@mitre.org","published":"2025-07-04T15:15:22.467","lastModified":"2025-07-17T16:00:02.243","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input."},{"lang":"es","value":"En MbedTLS 3.3.0 anterior a la 3.6.4, mbedtls_lms_import_public_key no comprueba que el búfer de entrada tenga al menos 4 bytes antes de leer un campo de 32 bits, lo que permite una posible lectura fuera de los límites en una entrada truncada. Específicamente, una lectura fuera de los límites en mbedtls_lms_import_public_key permite a atacantes dependientes del contexto provocar un fallo o una divulgación limitada de memoria adyacente al proporcionar un búfer de clave pública LMS (Leighton-Micali Signature) truncado de menos de cuatro bytes. Una clave pública LMS comienza con un indicador de tipo de 4 bytes. La función mbedtls_lms_import_public_key lee este indicador de tipo antes de validar el tamaño de su entrada."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":2.5}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*","versionStartIncluding":"3.3.0","versionEndExcluding":"3.6.4","matchCriteriaId":"670EA016-8FA4-4F42-A180-11243DCCD155"}]}]}],"references":[{"url":"https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-4.md","source":"cve@mitre.org","tags":["Third Party Advisory"]}]}}]}