
[CIVN-2026-0177] Multiple Vulnerabilities in OpenSSL
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in OpenSSL
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Software Affected
OpenSSL version 3.6.
OpenSSL version 3.5.
OpenSSL version 3.4.
OpenSSL version 3.3.
OpenSSL version 3.1.
OpenSSL version 3.0.
OpenSSL version 1.1.1
OpenSSL version 1.0.2
Overview
Multiple vulnerabilities have been reported in OpenSSL which could be exploited by an attacker to cause denial of service, or disclosure of sensitive information on the targeted system.
Target Audience:
All end-user organizations and individuals using OpenSSL.
Risk Assessment:
Risk of denial of service and sensitive information disclosure.
Impact Assessment:
Potential service disruption and unauthorized access to sensitive information.
Description
OpenSSL is a free and open-source software for general-purpose cryptography and secure communication. It provides a robust, full-featured toolkit for implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.
Multiple vulnerabilities exist in OpenSSL due to incorrect failure handling in RSA KEM RSASVE encapsulation; out-of-bounds read in AES-CFB-128 on X86-64 with AVX-512 support; potential use-after-free in DANE Client Code; NULL pointer dereference when processing a Delta CRL; possible NULL dereference when processing CMS KeyAgreeRecipientInfo; possible NULL dereference when processing CMS KeyTransportRecipientInfo; and heap buffer overflow in hexadecimal conversion. A remote attacker could exploit these vulnerabilities by sending specially crafted inputs.
Successful exploitation of these vulnerabilities could allow an attacker to cause a denial of service condition or disclose sensitive information on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://openssl-library.org/news/secadv/20260407.txt
Vendor Information
OpenSSL
https://openssl-library.org/news/vulnerabilities/
References
OpenSSL
https://openssl-library.org/news/secadv/20260407.txt
CVE Name
CVE-2026-31790
CVE-2026-28386
CVE-2026-28387
CVE-2026-28388
CVE-2026-28389
CVE-2026-28390
CVE-2026-31789
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=gOqw
—–END PGP SIGNATURE—–


