Type Confusion Vulnerability in OpenSSL Affecting TimeStamp Responses
CVE-2025-69420

Currently unrated

Key Information:

Vendor

OpenSSL

Status
Vendor
CVE Published:
27 January 2026

What is CVE-2025-69420?

A type confusion vulnerability exists within OpenSSL's TimeStamp Response verification code, which can lead to Denial of Service. When an invalid type is accessed without preliminary validation, applications invoking TS_RESP_verify_response() with a malformed TimeStamp Response can experience a memory crash due to dereferencing invalid pointers. This flaw specifically affects OpenSSL versions 3.6, 3.5, 3.4, 3.3, and 3.0, as the handling of ASN1_TYPE unions allows for these problematic memory accesses, making the exploitation possible through deliberately crafted Timestamp Responses.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

OpenSSL 3.6.0 < 3.6.1

OpenSSL 3.5.0 < 3.5.5

OpenSSL 3.4.0 < 3.4.4

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Luigino Camastra (Aisle Research)
Bob Beck
.