[CIVN-2026-0075] Remote Code Execution Vulnerability in OpenSSL

By Published On: February 7, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Remote Code Execution Vulnerability in OpenSSL


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


OpenSSL versions 3.0 prior to 3.0.19

OpenSSL versions 3.3 prior to 3.3.6

OpenSSL versions 3.4 prior to 3.4.4

OpenSSL versions 3.5 prior to 3.5.5

OpenSSL versions 3.6 prior to 3.6.1

Overview


A vulnerability has been reported in OpenSSL , which could allow a remote attacker to cause denial of service or potentially execute arbitrary code on the targeted system.


Target Audience:

Individuals and organizations using operating applications or services that process untrusted CMS or PKCS#7 content using OpenSSL.


Risk Assessment:

High risk of denial of service and potential remote code execution due to a stack-based buffer overflow that can be triggered without authentication.


Impact Assessment:

Application or service crashes leading to denial of service, remote code execution, and compromise of systems.


Description


OpenSSL is a widely used cryptographic library providing TLS, SSL, and cryptographic functionality for applications and services.


The vulnerability exists in OpenSSL due to improper handling of CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM. During parsing, the Initialization Vector (IV) encoded in ASN.1 parameters is copied into a fixed-size stack buffer without validating its length.


Successful exploitation of this vulnerability may allow a remote attacker to cause denial of service or potentially execute arbitrary code on the targeted system.


Solution


Update OpenSSL to the latest patched version as provided by the vendor:

https://openssl-library.org/news/vulnerabilities/index.html



Vendor Information


Open SSL

https://openssl-library.org/news/vulnerabilities/index.html


References


 

https://openssl-library.org/news/vulnerabilities/index.html


CVE Name

CVE-2025-15467




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmHJcYACgkQ3jCgcSdc

ys+Abw//cRiprjeZSYutzEuw4+O1T1odoEo1qN2fyulorwblyr8fVaOaiC1+8AiD

1H1H6nSy2HBTZ+1h75fWsx45AP5i2xzGQvkyMCv1Ma1XjCWW5wZu3kluRTGtBKPf

4qjmPahDugNvR9MaZi9xTZofxvmG2dSdB6ZxwyOl6C0+IiaNyPXlDgSwetnicSRz

uQ42RyaQhwPXTjDwJFuAikRtfJuPgZ2oVYdUmBxnck7GlOd9dhBocGz9+O2bmJ0L

iRPN1P3s6rwQ2cHiMb2SgzR/hVNwz9sh78+BPs1Bsih/yeiae99f3HdMsuULMbD3

A5f2GusFwXCAgZg8Md40jgcz4l2vtHVY9vlajWNgNkcUX/ag48sjoQkMbUnodV84

fbzG1rMR2d7j8gbBmkFe9GLfcx2g22g18kecAQvY6bx3/RFCvu2Bx3u/DFICVr5u

SHo+8stuGlRjZuYaIALdPY00yh7zqg0L9OPFHoxjHSwxCJBO4nPHTiUqmdnxCO7X

a301Q4BaWy5k9ZLVya+1aRj1IyHnKJ2fBHk6SwfTEEie2XzaxAx53iEvtIL8Xm+/

hsg3h1ghZMViOV9BeykIXQZFqxM2G/VQwESMzCkir+QGXFhpPrDTUwyalgtLiIoE

mO1lnYne4PsG2JTCDAVO7CdJetMFaMrBah/NhG02bMJNn6x8s04=

=LY3z

—–END PGP SIGNATURE—–

Share this article