Automation Analytics and Intelligence may be flagged for a critical vulnerability in OpenSSL versions 3․0 to 3․6 tracked as CVE-2025-15467․
Customers need to know if the application uses affected OpenSSL products to parse untrusted cryptographic message syntax or PKCS#7 content using authenticated encryption with associated data ciphers․
ERROR MESSAGE: "CVE-2025-15467"
SYMPTOMS:
Security scans flag OpenSSL versions 3․0 to 3․6
Potential risk of denial-of-service attack or arbitrary code execution
CONTEXT: Security vulnerability assessment for OpenSSL CVE-2025-15467․
IMPACT: Administrators require confirmation on product impact and remediation steps․
Products:
Automation Analytics & Intelligence Integration (AAI) for Broadcom Automation Distributed (Autosys, Automic) Product Release 24․X
Environment:
OS: Redhat Linux
App Server: JBoss
PREREQUISITES:
Administrator access to the host operating system
STEPS:
Step 1․ VERIFY PRODUCT CONFIGURATION
AAI does not use OpenSSL within the product to parse cryptographic message syntax or PKCS#7 content with AEAD ciphers․
EXPECTED: No direct impact from this vulnerability on the AAI product․
NOTE: AAI bundles JBoss, which may internally load OpenSSL from the underlying native Operating System․
Step 2․ REVIEW JBOSS TLS/SSL IMPLEMENTATION
Verify that JBoss is configured to utilize Java Secure Socket Extension as the default implementation for communications, rather than OpenSSL․
EXPECTED: The current configuration does not use the OpenSSL option․
Step 3․ APPLY OPERATING SYSTEM PATCHES
Apply the relevant operating system-level patches that address the reported OpenSSL vulnerability․
EXPECTED: The underlying native Operating System is secured according to best practices․
VERIFY SUCCESS:
Security scans no longer flag CVE-2025-15467 on the host operating system․
Additional Information:
ROOT CAUSE: The vulnerability exists in OpenSSL versions 3․0 to 3․6, which might be loaded internally by the underlying native Operating System hosting the JBoss application server․
RELATED RESOURCES:
OpenSSL Vulnerability Library: https://openssl-library․org/news/vulnerabilities/#CVE-2025-15467
KNOWN LIMITATIONS:
The product does not directly use OpenSSL, so no application-level patch is provided․
VERSION NOTES:
Redhat Linux: The vulnerability is specific to Redhat Linux․
Windows: Windows environments are not impacted․