We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-35471

conda-forge openssl-feedstock writable OPENSSLDIR



Description

conda-forge openssl-feedstock before 066e83c (2024-05-20), on Microsoft Windows, configures OpenSSL to use an OPENSSLDIR file path that can be written to by non-privilged local users. By writing a specially crafted openssl.cnf file in OPENSSLDIR, a non-privileged local user can execute arbitrary code with the privileges of the user or process loading openssl-feedstock DLLs. Miniforge before 24.5.0 is also affected.

Reserved 2025-04-15 | Published 2025-05-13 | Updated 2025-05-22 | Assigner cisa-cg


HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
HIGH: 7.0CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-427 Uncontrolled Search Path Element

Product status

Default status
unknown

Any version before 066e83c
affected

066e83c
unaffected

Default status
unknown

Any version before 24.5.0
affected

24.5.0
unaffected

References

github.com/...ommit/066e83c5226bafe90a9c0575b077ce30cd5f5921 (url)

github.com/conda-forge/openssl-feedstock/issues/201 (url)

cve.org (CVE-2025-35471)

nvd.nist.gov (CVE-2025-35471)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-35471

Support options

Helpdesk Chat, Email, Knowledgebase