CVE-2025-22865
Published: 28 January 2025
Description
Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.
Security Summary
CVE-2025-22865 affects the Go programming language's standard library, specifically the ParsePKCS1PrivateKey function used for parsing RSA private keys in PKCS#1 format. The vulnerability causes a panic when the function processes an RSA key missing its Chinese Remainder Theorem (CRT) values during the well-formedness verification step. It was published on 2025-01-28 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
A remote attacker requires no privileges or user interaction and can exploit this with low attack complexity over the network. Exploitation triggers a panic in applications using the affected function, enabling high confidentiality impact as per the CVSS score.
Mitigation details are outlined in Go's official resources, including the fix commit at https://go.dev/cl/643098, the issue tracker at https://go.dev/issue/71216, a golang-dev mailing list discussion at https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ, and the vulnerability entry at https://pkg.go.dev/vuln/GO-2025-3421. Affected Go installations should be updated to incorporate the patch.
Details
- CWE(s)