A vulnerability has been identified in OpenV2G (All versions < V0.9.6). The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads to memory corruption.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/html/ssa-647005.html | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-02-11 11:15
Updated : 2025-09-24 00:57
NVD link : CVE-2025-24956
Mitre link : CVE-2025-24956
CVE.ORG link : CVE-2025-24956
JSON object : View
Products Affected
siemens
- openv2g
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
