CVE-2025-65493

Multiple · Multiple products from various vendors that utilize the affected `coap_openssl` component.

A high-severity vulnerability has been identified in a software component responsible for secure communications, affecting multiple products from various vendors.

Executive summary

A high-severity vulnerability has been identified in a software component responsible for secure communications, affecting multiple products from various vendors. This flaw, a NULL pointer dereference, can be exploited by an unauthenticated remote attacker by sending a specially crafted network packet. Successful exploitation would cause the affected application or service to crash, resulting in a denial of service condition and disrupting operations.

Vulnerability

This vulnerability is a NULL pointer dereference within the src/coap_openssl source file, which handles DTLS (Datagram Transport Layer Security) for the CoAP (Constrained Application Protocol). An unauthenticated remote attacker can trigger this flaw by sending a specifically malformed DTLS packet to a vulnerable service. When the application processes this packet, it attempts to access a memory address that has not been properly initialized (a NULL pointer), causing the process to terminate abruptly and resulting in a denial of service.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5. The primary business impact is service unavailability. Successful exploitation will lead to a denial of service, rendering critical services unresponsive and potentially causing significant operational disruption, especially in IoT, industrial control, or other embedded systems where CoAP is commonly used. This can lead to loss of visibility or control over devices, interruption of data collection, and potential reputational damage if the affected service is customer-facing. Organizations must conduct a thorough inventory to identify all assets using the vulnerable component to understand the full scope of risk.

Remediation

Immediate Action: Apply security updates provided by the respective product vendors immediately. Prioritize patching for internet-facing and mission-critical systems to mitigate the risk of remote exploitation. Concurrently, security teams should actively monitor for any signs of exploitation attempts and review relevant system and network access logs for anomalous activity related to CoAP/DTLS traffic.

Proactive Monitoring: Implement enhanced monitoring for services using the CoAP protocol. Security teams should look for indicators of compromise such as:

  • Unexplained crashes or restarts of CoAP-enabled services.
  • An increase in malformed DTLS or CoAP packets detected by network security tools.
  • Anomalous traffic patterns from unknown or untrusted sources targeting UDP ports used by CoAP.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce risk:

  • Restrict access to vulnerable CoAP services at the network level using firewalls or Access Control Lists (ACLs), allowing connections only from trusted IP addresses.
  • Deploy an Intrusion Prevention System (IPS) with updated signatures capable of detecting and blocking traffic patterns associated with this exploit.
  • Place vulnerable systems in a segmented network zone to limit the impact of a potential compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.5) and the potential for a complete denial of service with a single crafted packet, organizations are strongly advised to treat this vulnerability as a high priority. Although this CVE is not currently listed on the CISA KEV catalog, its broad impact across multiple products and the relative ease of exploitation warrant immediate action. Organizations should initiate their patch management and vulnerability response procedures to identify all affected assets and deploy vendor-supplied updates as soon as they become available.