CVE-2025-66215Stack-based Buffer Overflow in Opensc

Severity
6.8MEDIUMNVD
CNA3.8
EPSS
0.0%
top 95.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 30

Description

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow WRITE in card-oberthur. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0.

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 0.9 | Impact: 5.9

Affected Packages3 packages

CVEListV5opensc/opensc< 0.27.0
NVDopensc_project/opensc< 0.27.0
Debianopensc_project/opensc< 0.27.0~rc1-1

Patches

🔴Vulnerability Details

2
CVEList
OpenSC: Stack-buffer-overflow WRITE in card-oberthur2026-03-30
OSV
CVE-2025-66215: OpenSC is an open source smart card tools and middleware2026-03-30

📋Vendor Advisories

2
Red Hat
OpenSC: OpenSC: Stack-buffer-overflow with physical access via crafted smart card or USB device2026-03-30
Debian
CVE-2025-66215: opensc - OpenSC is an open source smart card tools and middleware. Prior to version 0.27....2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-66215 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2025-66215 opensc: OpenSC: Stack-buffer-overflow with physical access via crafted smart card or USB device [fedora-all]2026-03-30
CVE-2025-66215 — Stack-based Buffer Overflow in Opensc | cvebase