This issue affects pbkdf2: from 3.0.10 through 3.1.2.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18922 | pbkdf2 returns predictable uninitialized/zero-filled memory for non-normalized or unimplemented algos |
Github GHSA |
GHSA-h7cp-r72f-jxh6 | pbkdf2 returns predictable uninitialized/zero-filled memory for non-normalized or unimplemented algos |
Thu, 10 Jul 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat service Mesh |
|
| CPEs | cpe:/a:redhat:service_mesh:3.0::el9 | |
| Vendors & Products |
Redhat
Redhat service Mesh |
Tue, 24 Jun 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 23 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Jun 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation. This vulnerability is associated with program files lib/to-buffer.Js. This issue affects pbkdf2: from 3.0.10 through 3.1.2. | |
| Title | pbkdf2 silently returns predictable uninitialized/zero-filled memory for non-normalized or unimplemented algos supported by Node.js | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: harborist
Published:
Updated: 2025-06-23T19:26:40.223Z
Reserved: 2025-06-23T18:39:39.611Z
Link: CVE-2025-6545
Updated: 2025-06-23T19:26:33.879Z
Status : Deferred
Published: 2025-06-23T19:15:25.220
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-6545
OpenCVE Enrichment
Updated: 2025-06-27T14:10:57Z
EUVD
Github GHSA