Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26195 | Erroneously using an all-zero seed for RSA-OEAP padding instead of the generated random bytes, in Oberon microsystems AG’s Oberon PSA Crypto library in all versions up to 1.5.1, results in deterministic RSA and thus in a loss of confidentiality for guessable messages, recognition of repeated messages, and loss of security proofs. |
| Link | Providers |
|---|---|
| https://www.oberon.ch/security-advisories/cve-2025-9071/ |
|
Fri, 29 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 29 Aug 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Erroneously using an all-zero seed for RSA-OEAP padding instead of the generated random bytes, in Oberon microsystems AG’s Oberon PSA Crypto library in all versions up to 1.5.1, results in deterministic RSA and thus in a loss of confidentiality for guessable messages, recognition of repeated messages, and loss of security proofs. | |
| Title | Insecure RSA-OAEP implementation with all-zero seed for padding in Oberon PSA Crypto | |
| Weaknesses | CWE-780 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2025-08-29T13:45:42.363Z
Reserved: 2025-08-15T14:58:36.635Z
Link: CVE-2025-9071
Updated: 2025-08-29T13:45:33.657Z
Status : Deferred
Published: 2025-08-29T10:15:33.020
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-9071
No data.
OpenCVE Enrichment
No data.
EUVD