CVE-2025-24970 — Improper Input Validation in Netty
Severity
7.5HIGHNVD
EPSS
1.0%
top 23.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 10
Latest updateJul 15
Description
Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
Patches
🔴Vulnerability Details
3OSV▶
CVE-2025-24970: Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4↗2025-02-10
OSV▶
SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine↗2025-02-10
GHSA▶
SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine↗2025-02-10
📋Vendor Advisories
4Oracle▶
Oracle Oracle TimesTen In-Memory Database Risk Matrix: EM TimesTen plug-in (Netty) — CVE-2025-24970↗2025-04-15
Red Hat▶
io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine↗2025-02-10
Debian▶
CVE-2025-24970: netty - Netty, an asynchronous, event-driven network application framework, has a vulner...↗2025