Vulnerability Description
A divide-by-zero in the encryption/decryption routines of GNU Recutils v1.9 allows attackers to cause a Denial of Service (DoS) via inputting an empty value as a password.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Recutils | 1.9 |
Related Weaknesses (CWE)
References
- http://ftp.gnu.org/gnu/recutils/Product
- https://github.com/MAXEUR5/Vulnerability_Disclosures/blob/main/2025/CVE-2025-654ExploitThird Party Advisory
- https://lists.gnu.org/archive/html/bug-recutils/2025-10/msg00004.htmlMailing ListPatch
- https://www.gnu.org/software/recutils/Product
- https://github.com/MAXEUR5/Vulnerability_Disclosures/blob/main/2025/CVE-2025-654ExploitThird Party Advisory
FAQ
What is CVE-2025-65409?
CVE-2025-65409 is a vulnerability with a CVSS score of 7.5 (HIGH). A divide-by-zero in the encryption/decryption routines of GNU Recutils v1.9 allows attackers to cause a Denial of Service (DoS) via inputting an empty value as a password.
How severe is CVE-2025-65409?
CVE-2025-65409 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65409?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Recutils.