Missing Cryptographic Step Affecting openssl package, versions [1.1.1q,3.0.19)[3.1.0,3.3.6)[3.4.0,3.4.4)[3.5.0,3.5.5)[3.6.0,3.6.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-OPENSSL-15124948
  • published28 Jan 2026
  • disclosed27 Jan 2026
  • creditStanislav Fort

Introduced: 27 Jan 2026

CVE-2025-69418  (opens in a new tab)
CWE-325  (opens in a new tab)

How to fix?

Upgrade openssl to version 3.0.19, 3.3.6, 3.4.4, 3.5.5, 3.6.1 or higher.

Overview

Affected versions of this package are vulnerable to Missing Cryptographic Step that exposes the final 1-15 bytes of a message when the low-level OCB API is used directly with AES-NI or other hardware accelerated code paths. Common implementations of openssl using EVP are not vulnerable. Only applications that call the CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with non-block-aligned lengths in a single call on hardware-accelerated builds are vulnerable.

CVSS Base Scores

version 4.0
version 3.1