PT-2026-4955 · Openssl+5 · Openssl+5
Bob Beck
+1
·
Published
2026-01-01
·
Updated
2026-03-15
·
CVE-2026-22796
CVSS v3.1
5.3
Medium
| AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
Name of the Vulnerable Software and Affected Versions
OpenSSL versions 1.0.2 through 3.6
Description
A type confusion issue exists in the signature verification of signed PKCS#7 data. This occurs when an ASN1 TYPE union member is accessed without first validating the type, potentially leading to an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Exploiting this requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of exploitation is a denial-of-service. The vulnerable code is within the
PKCS7 digest from attributes() function, which accesses the message digest attribute value without validating its type. This can result in accessing invalid memory through the ASN1 TYPE union, causing a crash. The PKCS7 API is considered legacy, and applications should use the CMS API instead.Recommendations
OpenSSL version 1.0.2: Update to a newer version.
OpenSSL versions 1.1.1 through 3.6: Update to the latest version.
Fix
DoS
Improper Check for Exceptional Conditions
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Freebsd
Ibm Aix
Linuxmint
Openssl
Rocky Linux
Ubuntu