High Severity vulnerability present in OpenSSL version 3.x

Australian Cyber Security Centre

Background /What has happened?

A buffer overflow vulnerability (CVE-2022-3786) and a buffer overrun vulnerability (CVE-2022-3602) has been identified in OpenSSL versions above 3.x.

OpenSSL is a widely used cryptographic and secure communication software. OpenSSL is available on all Operating Systems (OS).

Exploitation of this vulnerability could allow a malicious actor to gain remote code execution rights on the host running OpenSSL and perform unauthorised actions. Additionally, a malicious email address can be crafted to exploit the vulnerabilities and cause a crash (denial of service).

Affected Australian organisations should apply the available patch immediately. The ACSC is not aware of any successful exploitation attempts against Australian organisations.

Mitigation / How do I stay secure?

Australian organisations that use OpenSSL versions avove 3.x should review their patch status and update to the latest version. There are no known workarounds.

Assistance / Where can I go for help?

The ACSC is monitoring the situation and can provide assistance and advice as required. Organisations that have been impacted or require assistance can contact the ACSC via 1300 CYBER1.

/Public Release. This material from the originating organization/author(s) might be of the point-in-time nature, and edited for clarity, style and length. Mirage.News does not take institutional positions or sides, and all views, positions, and conclusions expressed herein are solely those of the author(s).View in full here.