[CIVN-2026-0177] Multiple Vulnerabilities in OpenSSL

By Published On: April 9, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in OpenSSL


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: MEDIUM


Software Affected


OpenSSL version 3.6.

OpenSSL version 3.5.

OpenSSL version 3.4.

OpenSSL version 3.3.

OpenSSL version 3.1.

OpenSSL version 3.0.

OpenSSL version 1.1.1

OpenSSL version 1.0.2

Overview


Multiple vulnerabilities have been reported in OpenSSL which could be exploited by an attacker to cause denial of service, or disclosure of sensitive information on the targeted system.


Target Audience:

All end-user organizations and individuals using OpenSSL.


Risk Assessment:

Risk of denial of service and sensitive information disclosure.


Impact Assessment:

Potential service disruption and unauthorized access to sensitive information.


Description


OpenSSL is a free and open-source software for general-purpose cryptography and secure communication. It provides a robust, full-featured toolkit for implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.


Multiple vulnerabilities exist in OpenSSL due to incorrect failure handling in RSA KEM RSASVE encapsulation; out-of-bounds read in AES-CFB-128 on X86-64 with AVX-512 support; potential use-after-free in DANE Client Code; NULL pointer dereference when processing a Delta CRL; possible NULL dereference when processing CMS KeyAgreeRecipientInfo; possible NULL dereference when processing CMS KeyTransportRecipientInfo; and heap buffer overflow in hexadecimal conversion. A remote attacker could exploit these vulnerabilities by sending specially crafted inputs.


Successful exploitation of these vulnerabilities could allow an attacker to cause a denial of service condition or disclose sensitive information on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://openssl-library.org/news/secadv/20260407.txt



Vendor Information


OpenSSL

https://openssl-library.org/news/vulnerabilities/


References


OpenSSL

https://openssl-library.org/news/secadv/20260407.txt


CVE Name

CVE-2026-31790

CVE-2026-28386

CVE-2026-28387

CVE-2026-28388

CVE-2026-28389

CVE-2026-28390

CVE-2026-31789




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnXrzcACgkQ3jCgcSdc

ys+0xRAAkjclCdlnEu2aU1JdTClDl9sRSZBY+GnhLJjehsJZLz9mXBOXf8cWTcv5

hKGM5rbHD6hhMBNnuKRS3dy3Hru9+VgrF+k0n+ZUWICnaqISraXro8cFjFxuOGj+

bN7BnT0sQ8jIdPhfSFa5pabhW70ktOEjzwm7Wt4mHJQAAbPaUUi5tsCjF7HJaAk7

q1quKx0k8fYyBGHDq/Kh2P492so4zAMFO5L5K6KKmlebm9eCpBl6uB46DQbDd3Bt

t2kd99vWocMGUnnM6uaXQLd7GUalSnanT9wv9HaiMb5CcKYG5AVr6DSdIYcMwryM

63YLLZ0M24Q4prxlfgEYgnDmVx/NUDY4wLbS7c2sqd9CnKkruS2baLMopZ5CzaYC

O8VJgd3CMH/jHU49UpmkCTj5annabgNmwZzMVg9fdJhjICY+QMsod++avaER6lA4

VndvXbXHIEL+J/tn6lOd7meZYpsf5vFlblITbuttNxrv6aVq81gSK1HBel3PGSQJ

YkbqfJABcJyhAUjPse0uVLTSbVR46GIlrjbQxSz3AzrFHwrezMqh1p10djWeMiOC

+mjWMjoO4VGuDlzOwk2ZDREwgU8/jzanIhdpksQam/x6FmhiU1b2ZJdABG5pxY98

QX8IqXfKc6FV9xy/30WQogCXaIn6y9+vAyGXhQ61bJU+dqpyYgM=

=gOqw

—–END PGP SIGNATURE—–

Share this article