CVE-2025-24970Improper Input Validation in Netty

Severity
7.5HIGHNVD
EPSS
1.0%
top 23.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 10
Latest updateJul 15

Description

Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDnetty/netty4.1.914.1.118
CVEListV5netty/netty>= 4.1.91.Final, <= 4.1.117.Final
debiandebian/netty

Patches

🔴Vulnerability Details

3
OSV
CVE-2025-24970: Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 42025-02-10
OSV
SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine2025-02-10
GHSA
SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine2025-02-10

📋Vendor Advisories

4
Oracle
Oracle Oracle GoldenGate Risk Matrix: Stream Analytics (Netty) — CVE-2025-249702025-07-15
Oracle
Oracle Oracle TimesTen In-Memory Database Risk Matrix: EM TimesTen plug-in (Netty) — CVE-2025-249702025-04-15
Red Hat
io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine2025-02-10
Debian
CVE-2025-24970: netty - Netty, an asynchronous, event-driven network application framework, has a vulner...2025