Metrics
Affected Vendors & Products
Solution
Upgrade to Axxon One with OpenSSL 3.0.13 or later, where session key management logic was refactored to avoid unsafe memory reallocations.
Workaround
No workaround given by the vendor.
Wed, 10 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 10 Sep 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) in the OpenSSL-based session module in AxxonSoft Axxon One 2.0.6 and earlier on Windows allows a remote attacker under high load conditions to cause application crashes or unpredictable behavior via triggering memory reallocation errors when handling expired session keys. | |
Title | Incorrect Memory Allocation in OpenSSL-Based Session Module in AxxonSoft Axxon One | |
Weaknesses | CWE-119 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AxxonSoft
Published:
Updated: 2025-09-10T13:12:27.743Z
Reserved: 2025-09-10T12:37:02.143Z
Link: CVE-2025-10225

Updated: 2025-09-10T13:12:21.133Z

Status : Received
Published: 2025-09-10T13:15:36.430
Modified: 2025-09-10T13:15:36.430
Link: CVE-2025-10225

No data.

No data.