
[CIVN-2026-0075] Remote Code Execution Vulnerability in OpenSSL
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in OpenSSL
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
OpenSSL versions 3.0 prior to 3.0.19
OpenSSL versions 3.3 prior to 3.3.6
OpenSSL versions 3.4 prior to 3.4.4
OpenSSL versions 3.5 prior to 3.5.5
OpenSSL versions 3.6 prior to 3.6.1
Overview
A vulnerability has been reported in OpenSSL , which could allow a remote attacker to cause denial of service or potentially execute arbitrary code on the targeted system.
Target Audience:
Individuals and organizations using operating applications or services that process untrusted CMS or PKCS#7 content using OpenSSL.
Risk Assessment:
High risk of denial of service and potential remote code execution due to a stack-based buffer overflow that can be triggered without authentication.
Impact Assessment:
Application or service crashes leading to denial of service, remote code execution, and compromise of systems.
Description
OpenSSL is a widely used cryptographic library providing TLS, SSL, and cryptographic functionality for applications and services.
The vulnerability exists in OpenSSL due to improper handling of CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM. During parsing, the Initialization Vector (IV) encoded in ASN.1 parameters is copied into a fixed-size stack buffer without validating its length.
Successful exploitation of this vulnerability may allow a remote attacker to cause denial of service or potentially execute arbitrary code on the targeted system.
Solution
Update OpenSSL to the latest patched version as provided by the vendor:
https://openssl-library.org/news/vulnerabilities/index.html
Vendor Information
Open SSL
https://openssl-library.org/news/vulnerabilities/index.html
References
https://openssl-library.org/news/vulnerabilities/index.html
CVE Name
CVE-2025-15467
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmHJcYACgkQ3jCgcSdc
ys+Abw//cRiprjeZSYutzEuw4+O1T1odoEo1qN2fyulorwblyr8fVaOaiC1+8AiD
1H1H6nSy2HBTZ+1h75fWsx45AP5i2xzGQvkyMCv1Ma1XjCWW5wZu3kluRTGtBKPf
4qjmPahDugNvR9MaZi9xTZofxvmG2dSdB6ZxwyOl6C0+IiaNyPXlDgSwetnicSRz
uQ42RyaQhwPXTjDwJFuAikRtfJuPgZ2oVYdUmBxnck7GlOd9dhBocGz9+O2bmJ0L
iRPN1P3s6rwQ2cHiMb2SgzR/hVNwz9sh78+BPs1Bsih/yeiae99f3HdMsuULMbD3
A5f2GusFwXCAgZg8Md40jgcz4l2vtHVY9vlajWNgNkcUX/ag48sjoQkMbUnodV84
fbzG1rMR2d7j8gbBmkFe9GLfcx2g22g18kecAQvY6bx3/RFCvu2Bx3u/DFICVr5u
SHo+8stuGlRjZuYaIALdPY00yh7zqg0L9OPFHoxjHSwxCJBO4nPHTiUqmdnxCO7X
a301Q4BaWy5k9ZLVya+1aRj1IyHnKJ2fBHk6SwfTEEie2XzaxAx53iEvtIL8Xm+/
hsg3h1ghZMViOV9BeykIXQZFqxM2G/VQwESMzCkir+QGXFhpPrDTUwyalgtLiIoE
mO1lnYne4PsG2JTCDAVO7CdJetMFaMrBah/NhG02bMJNn6x8s04=
=LY3z
—–END PGP SIGNATURE—–


