Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 09 Jan 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gnu:recutils:1.9:*:*:*:*:*:*:* |
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu recutils |
|
| Vendors & Products |
Gnu
Gnu recutils |
Fri, 02 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-369 | |
| Metrics |
cvssV3_1
|
ssvc
|
Thu, 01 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Recutils: Recutils: Denial of Service due to divide-by-zero with empty password input | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 30 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A divide-by-zero in the encryption/decryption routines of GNU Recutils v1.9 allows attackers to cause a Denial of Service (DoS) via inputting an empty value as a password. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-02T18:08:40.519Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65409
Updated: 2026-01-02T16:08:15.014Z
Status : Analyzed
Published: 2025-12-30T18:15:47.003
Modified: 2026-01-09T19:49:03.333
Link: CVE-2025-65409
OpenCVE Enrichment
Updated: 2026-01-05T10:22:16Z