NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
References
| Link | Resource |
|---|---|
| https://github.com/obgm/libcoap/issues/1746 | Issue Tracking |
| https://github.com/obgm/libcoap/pull/1750 | Issue Tracking Patch |
Configurations
History
01 Dec 2025, 16:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/obgm/libcoap/issues/1746 - Issue Tracking | |
| References | () https://github.com/obgm/libcoap/pull/1750 - Issue Tracking, Patch | |
| CPE | cpe:2.3:a:libcoap:libcoap:4.3.5:-:*:*:*:*:*:* | |
| First Time |
Libcoap libcoap
Libcoap |
24 Nov 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| CWE | CWE-476 |
24 Nov 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-24 14:15
Updated : 2025-12-01 16:31
NVD link : CVE-2025-65498
Mitre link : CVE-2025-65498
CVE.ORG link : CVE-2025-65498
JSON object : View
Products Affected
libcoap
- libcoap
CWE
CWE-476
NULL Pointer Dereference
