Impact
openCryptoki, versions 3.25.0 and 3.26.0, includes a heap buffer overflow in the CKM_ECDH_AES_KEY_WRAP implementation of C_WrapKey. When an attacker supplies a compressed elliptic‑curve public key and invokes C_WrapKey, the library calculates an incorrect buffer size, causing out‑of‑bounds writes on the heap. This corruption can destabilize the affected process and may be exploited to crash the host application, which results in a denial‑of‑service scenario.
Affected Systems
The vulnerability applies to the opencryptoki project’s opencryptoki library on Linux and AIX. Affected binaries are version 3.25.0 and 3.26.0. No other releases are impacted in the current data set.
Risk and Exploitability
The CVSS base score is 6.6, indicating moderate severity. The EPSS score is below 1%, representing a very low expected exploitation probability at present. The flaw is not listed in the CISA Known Exploited Vulnerabilities catalog. Because the bug manifests when a local process invokes C_WrapKey with a crafted key, the attack vector is local privilege, and an attacker would need code execution or the ability to influence the key input for a running process that uses this library. If such conditions are met, the out‑of‑bounds write could corrupt heap structures and crash the application.
OpenCVE Enrichment