Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.
References
| Link | Resource |
|---|---|
| https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4 | Patch |
| https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20250221-0005/ | Third Party Advisory |
| https://www.vicarius.io/vsociety/posts/cve-2025-24970-netty-vulnerability-detection | Exploit Third Party Advisory |
| https://www.vicarius.io/vsociety/posts/cve-2025-24970-netty-vulnerability-mitigation | Exploit Mitigation Third Party Advisory |
| https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2025-02-10 22:15
Updated : 2025-09-05 17:20
NVD link : CVE-2025-24970
Mitre link : CVE-2025-24970
CVE.ORG link : CVE-2025-24970
JSON object : View
Products Affected
netty
- netty
netapp
- active_iq_unified_manager
- oncommand_insight
CWE
