CVE-2025-65409

Published: Dic 30, 2025 Last Modified: Gen 09, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

A divide-by-zero in the encryption/decryption routines of GNU Recutils v1.9 allows attackers to cause a Denial of Service (DoS) via inputting an empty value as a password.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0004
Percentile
0,1th
Updated

EPSS Score Trend (Last 76 Days)

369

Divide By Zero

Draft
Common Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Crash, Exit, Or Restart
Applicable Platforms
All platforms may be affected
View CWE Details
Application

Recutils by Gnu

cpe:2.3:a:gnu:recutils:1.9:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/MAXEUR5/Vulnerability_Disclosures/blob/main/2025/CVE-2025-65…
http://ftp.gnu.org/gnu/recutils/
https://github.com/MAXEUR5/Vulnerability_Disclosures/blob/main/2025/CVE-2025-65…
https://lists.gnu.org/archive/html/bug-recutils/2025-10/msg00004.html
https://www.gnu.org/software/recutils/