A vulnerability has been identified in OpenV2G (All versions < V0.9.6). The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads to memory corruption.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/html/ssa-647005.html | Vendor Advisory |
Configurations
History
24 Sep 2025, 00:57
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:siemens:openv2g:*:*:*:*:*:*:*:* | |
| References | () https://cert-portal.siemens.com/productcert/html/ssa-647005.html - Vendor Advisory | |
| Summary |
|
|
| First Time |
Siemens
Siemens openv2g |
11 Feb 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-11 11:15
Updated : 2025-09-24 00:57
NVD link : CVE-2025-24956
Mitre link : CVE-2025-24956
CVE.ORG link : CVE-2025-24956
JSON object : View
Products Affected
siemens
- openv2g
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
