Bug 2417384 (CVE-2025-66030) - CVE-2025-66030 node-forge: node-forge: Integer Overflow allows OID-based security bypass
Summary: CVE-2025-66030 node-forge: node-forge: Integer Overflow allows OID-based secu...
Keywords:
Status: NEW
Alias: CVE-2025-66030
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-11-26 23:01 UTC by OSIDB Bzimport
Modified: 2025-12-09 22:47 UTC (History)
128 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-11-26 23:01:13 UTC
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.


Note You need to log in before you can comment on or make changes to this bug.