Bug 2408814 (CVE-2025-11602)

Summary: CVE-2025-11602 neo4j: Untargeted information leak in Bolt protocol handshake
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: asoldano, bbaranow, bmaxwell, brian.stansberry, darran.lofthouse, dosoudil, fjuma, gmalinko, istudens, ivassile, iweiss, janstey, mosmerov, msvehla, nwallace, pdelbell, pesilva, pjindal, pmackay, rstancel, rstepani, sdawley, smaestri, tom.jenkinson
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Neo4j. A potential information leak in the bolt protocol handshake allows an attacker to obtain one byte of information from previous connections. However, the attacker has no control over the information leaked in server responses.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2025-10-31 11:01:21 UTC
Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses.