CVE-2025-22865Improper Handling of Syntactically Invalid Structure in Standard Library Crypto X509

Severity
7.5HIGHNVD
EPSS
0.1%
top 77.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 28

Description

Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

CVEListV5go_standard_library/crypto_x5091.24.0-01.24.0-rc.2

🔴Vulnerability Details

4
OSV
CVE-2025-22865: Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed2025-01-28
OSV
ParsePKCS1PrivateKey panic with partial keys in crypto/x5092025-01-28
CVEList
ParsePKCS1PrivateKey panic with partial keys in crypto/x5092025-01-28
GHSA
GHSA-v7qx-rccr-23xm: Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed2025-01-28

📋Vendor Advisories

2
Red Hat
crypto/x509: ParsePKCS1PrivateKey panic with partial keys in crypto/x5092025-01-28
Debian
CVE-2025-22865: golang-1.15 - Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values wou...2025
CVE-2025-22865 — HIGH severity | cvebase