PT-2026-4954 · Openssl+5 · Openssl 3.6.0+15
Bob Beck
+1
·
Published
2026-01-01
·
Updated
2026-03-15
·
CVE-2026-22795
CVSS v3.1
5.5
Medium
| AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
OpenSSL versions 1.1.1, 3.0, 3.3, 3.4, and 3.5
OpenSSL versions 3.6 through 3.6.0
Description
An invalid or NULL pointer dereference can occur in applications processing malformed PKCS#12 files. This can lead to a denial of service when an application attempts to read from an invalid or NULL pointer in memory. The issue stems from a type confusion in the PKCS#12 parsing code, where an ASN1 TYPE union member is accessed without prior type validation, resulting in an invalid pointer read. The vulnerability is constrained to a 1-byte address space, which typically results in a crash due to unmapped memory on modern operating systems. Exploitation requires processing a maliciously crafted PKCS#12 file.
Recommendations
OpenSSL version 1.1.1: At the moment, there is no information about a newer version that contains a fix for this vulnerability.
OpenSSL versions 3.0, 3.3, and 3.4: At the moment, there is no information about a newer version that contains a fix for this vulnerability.
OpenSSL versions 3.5 through 3.5.4: Update to version 3.5.5.
OpenSSL versions 3.6 through 3.6.0: Update to version 3.6.1.
DoS
Improper Check for Exceptional Conditions
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Freebsd
Ibm Aix
Linuxmint
Openssl 1.1.1
Openssl 3.0
Openssl 3.3
Openssl 3.4
Openssl 3.5
Openssl 3.5.4
Openssl 3.5.5
Openssl 3.6
Openssl 3.6.0
Openssl 3.6.1
Openssl
Rocky Linux
Ubuntu