#VU68116 Inadequate Encryption Strength in OpenSSL


Published: 2022-11-08

Vulnerability identifier: #VU68116

Vulnerability risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-3358

CWE-ID: CWE-326

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
OpenSSL
Server applications / Encryption software

Vendor: OpenSSL Software Foundation

Description

The vulnerability allows a remote attacker to decrypt traffic.

The vulnerability exists due to an error in openssl implementation when handling legacy custom ciphers with NID_undef passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions. Under certain conditions openssl can fail to select a proper cipher and use NULL instead, which corresponds to sending data in plain text.

Note, applications are only affected by this issue if they call EVP_CIPHER_meth_new() using NID_undef and subsequently use it in a call to an encryption/decryption initialisation function.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

OpenSSL: 3.0.0 - 3.0.5


CPE

External links
http://www.openssl.org/news/secadv/20221011.txt
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability