Categories: Cyber Security News

Multiple OpenSSL Vulnerabilities Exposes Sensitive Data in RSA KEM Handling

OpenSSL has released a broad April 2026 security update that fixes seven vulnerabilities across supported branches, led by CVE-2026-31790, a moderate-severity flaw in RSA KEM RSASVE encapsulation that can expose uninitialized memory to a malicious peer.

The advisory directs users of vulnerable 3.x releases to move to OpenSSL 3.0.20, 3.3.7, 3.4.5, 3.5.6, or 3.6.2, depending on the branch in use.

OpenSSL Vulnerabilities Expose Data

The most serious issue, CVE-2026-31790, affects applications that use EVP_PKEY_encapsulate() with RSA/RSASVE to derive a shared secret from an attacker-supplied RSA public key without validating that key first.

According to OpenSSL, the underlying bug is an incorrect return-value check: RSA_public_encrypt() returns -1 on failure, but the affected code only checked whether the value was non-zero, allowing encapsulation to appear successful even when encryption had actually failed.

That logic error creates a dangerous outcome for developers using caller-supplied ciphertext buffers. If the RSA operation fails, the API can still set output lengths and return control as though a valid KEM ciphertext was generated, leaving stale or uninitialized bytes in the ciphertext buffer to be sent back to the peer.

OpenSSL warned that those bytes could contain sensitive data left over from a previous execution of the application process, turning what looks like a failed cryptographic operation into a data leakage condition.

The vendor said the flaw affects OpenSSL 3.0, 3.3, 3.4, 3.5, and 3.6, while OpenSSL 1.0.2 and 1.1.1 are not affected. FIPS modules in versions 3.6, 3.5, 3.4, 3.3, 3.1, and 3.0 are also impacted, making the issue relevant not only to general-purpose deployments but also to regulated environments that rely on validated cryptographic boundaries.

As an immediate mitigation, OpenSSL recommends calling EVP_PKEY_public_check() or EVP_PKEY_public_check_quick() before invoking EVP_PKEY_encapsulate().

That guidance matters because exploitation depends on the application accepting an invalid attacker-controlled RSA public key in the first place, which means environments that already validate imported public keys are in a much better position than applications that treat key material as implicitly trusted.

Alongside the moderate-severity RSASVE bug, OpenSSL fixed six low-severity flaws that are more situational but still important for defenders tracking library exposure.

These include an out-of-bounds read in AES-CFB-128 on x86-64 systems with AVX-512 and VAES support (CVE-2026-28386), a use-after-free in uncommon DANE client configurations (CVE-2026-28387), a delta CRL NULL dereference (CVE-2026-28388), two CMS NULL dereference issues in KeyAgreeRecipientInfo and KeyTransportRecipientInfo handling (CVE-2026-28389 and CVE-2026-28390), and a heap buffer overflow during oversized OCTET STRING hexadecimal conversion on 32-bit platforms (CVE-2026-31789).

Most of those issues primarily create denial-of-service conditions, but they highlight a recurring risk pattern in cryptographic libraries: edge-case parsing and error-handling paths often become attack surfaces when applications process untrusted certificates, CMS objects, CRLs, or public keys.

For security teams, the update is a reminder that OpenSSL exposure is not limited to TLS termination alone; mail gateways, certificate-processing tools, CMS/S/MIME services, and custom applications using modern KEM APIs may all need review.

OpenSSL said CVE-2026-31790 was reported by Simo Sorce of Red Hat on February 23, 2026, and the fix was developed by Nikola Pajkovsky.

Organizations still running affected builds should prioritize patching and add explicit public-key validation to any workflow using RSA-based encapsulation, especially where remote or user-supplied key material can reach the API surface.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Multiple OpenSSL Vulnerabilities Exposes Sensitive Data in RSA KEM Handling appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The agents are coming, the agents aren’t coming.

The Promise vs. The Reality Last year was meant to be the year of the…

35 minutes ago

Hackers Use Fake BTS World Tour Ticket Sites to Scam Fans Across Multiple Countries

Cybercriminals are capitalizing on the excitement around BTS’s long-awaited return to the world stage by…

35 minutes ago

Censys Warns 5,219 Rockwell/Allen-Bradley PLCs Are Exposed Amid Iranian APT Activity

The FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command jointly disclosed on April 7,…

36 minutes ago

Hackers Exploit GitHub Copilot Flaw to Exfiltrate Sensitive Data

A recently disclosed high-severity vulnerability in GitHub Copilot Chat allowed attackers to silently siphon sensitive…

36 minutes ago

HPE Aruba Private 5G Platform Vulnerability Enables Credential Theft Attacks

Hewlett-Packard Enterprise (HPE) has disclosed a security flaw in its Aruba Networking Private 5G Core…

36 minutes ago

Hackers Impersonate Secure Messaging Apps to Deploy ProSpy in Middle East Espionage Attacks

A targeted mobile espionage campaign has been quietly operating across the Middle East since at…

36 minutes ago

This website uses cookies.