2 HIGH Severity Vulnerabilities Reported on OPENSSL

Two high severity vulnerabilities have been reported on OPENSSL. These vulnerabilities (CVE-2022-3602 and CVE-2022-3786) affect the OpenSSL 3.0.0 and later versions.

Both vulnerabilities are related to a buffer overrun in the name checking function of X.509 certificates in OpenSSL. Their exploitation could lead to a denial of service (DOS) of systems/applications using the vulnerable OpenSSL version.

Vulnerable OPENSSL versions

  • OPENSSL 3.0.0 to 3.0.6

Due to the possibility of exploiting these vulnerabilities remotely and the consequences (denial of service), it is strongly recommended to update immediately.

Mitigation

To fix both vulnerabilities, you must migrate to OpenSSL 3.0.7. See the following link for details https://www.openssl.org/news/vulnerabilities-3.0.html

As additional measures, Streamscan recommends you to:

  • Quickly inventory machines and applications that use OpenSSL 3.0 or newer versions.
  • Communicate if necessary with the vendors of applications you use that use OpenSSL 3.0 or newer.
  • Schedule patch installation based on the criticality of the machine/application.

Threat Status

Checks made over the last few days and today November 1, 2022 by our Cyber Threat Intelligence team show that there are no attack exploits (POC) available for free download to exploit these vulnerabilities. However, in our experience, it is only a matter of time before POCs appear. It is therefore important to apply patches quickly.

How can StreamScan help you?

Cyber attacks are exploding all the time. Without continuous security monitoring, you have no visibility into what attacks are targeting you. You can't protect yourself from what you can't see.

Let us put our eyes on your network. Join our MDR managed monitoring platform powered by our CDS cyber threat detection technology and keep yourself safe from cyberattacks.

Contact us at +1 877 208-9040 or talk to one of our experts.

CTA Newsletter