Impact
A flaw in p11-kit allows a remote attacker to invoke the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derived mechanism parameters set to NULL. This can cause the RPC client to attempt to return an uninitialized value, potentially leading to a NULL dereference or other undefined behavior that may result in application‑level denial of service or unpredictable system states.
Affected Systems
Red Hat Enterprise Linux 10, 6, 7, 8, and 9; Red Hat Hardened Images; Red Hat OpenShift Container Platform 4. Version details are not specified in the CNA data, so any installation that uses the affected p11-kit library is potentially impacted.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.3, indicating moderate severity. EPSS is reported as < 1 %, implying a very low probability of exploitation in the wild. The issue is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is a remote RPC call to a token that accepts the specific null parameters; an attacker would need remote access to the token’s interface to trigger the vulnerability and cause denial of service or instability. This interpretation is inferred from the description and is not explicitly documented in the CVE data. No CNA workaround is available that meets Red Hat’s security criteria, so no suitable alternative exists.
OpenCVE Enrichment