CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 08, 2026

Multiple OpenSSL Vulnerabilities Exposes Sensitive Data in RSA KEM Handling

Cybersecurity News Archived Apr 08, 2026 ✓ Full text saved

OpenSSL has released a broad April 2026 security update that fixes seven vulnerabilities across supported branches, led by CVE-2026-31790, a moderate-severity flaw in RSA KEM RSASVE encapsulation that can expose uninitialized memory to a malicious peer. The advisory directs users of vulnerable 3.x releases to move to OpenSSL 3.0.20, 3.3.7, 3.4.5, 3.5.6, or 3.6.2, depending […] The post Multiple OpenSSL Vulnerabilities Exposes Sensitive Data in RSA KEM Handling appeared first on Cyber Security Ne

Full text archived locally
✦ AI Summary · Claude Sonnet


    Home Cyber Security Multiple OpenSSL Vulnerabilities Exposes Sensitive Data in RSA KEM Handling OpenSSL has released a broad April 2026 security update that fixes seven vulnerabilities across supported branches, led by CVE-2026-31790, a moderate-severity flaw in RSA KEM RSASVE encapsulation that can expose uninitialized memory to a malicious peer. The advisory directs users of vulnerable 3.x releases to move to OpenSSL 3.0.20, 3.3.7, 3.4.5, 3.5.6, or 3.6.2, depending on the branch in use. OpenSSL Vulnerabilities Expose Data The most serious issue, CVE-2026-31790, affects applications that use EVP_PKEY_encapsulate() with RSA/RSASVE to derive a shared secret from an attacker-supplied RSA public key without validating that key first. According to OpenSSL, the underlying bug is an incorrect return-value check: RSA_public_encrypt() returns -1 on failure, but the affected code only checked whether the value was non-zero, allowing encapsulation to appear successful even when encryption had actually failed. That logic error creates a dangerous outcome for developers using caller-supplied ciphertext buffers. If the RSA operation fails, the API can still set output lengths and return control as though a valid KEM ciphertext was generated, leaving stale or uninitialized bytes in the ciphertext buffer to be sent back to the peer. OpenSSL warned that those bytes could contain sensitive data left over from a previous execution of the application process, turning what looks like a failed cryptographic operation into a data leakage condition. The vendor said the flaw affects OpenSSL 3.0, 3.3, 3.4, 3.5, and 3.6, while OpenSSL 1.0.2 and 1.1.1 are not affected. FIPS modules in versions 3.6, 3.5, 3.4, 3.3, 3.1, and 3.0 are also impacted, making the issue relevant not only to general-purpose deployments but also to regulated environments that rely on validated cryptographic boundaries. As an immediate mitigation, OpenSSL recommends calling EVP_PKEY_public_check() or EVP_PKEY_public_check_quick() before invoking EVP_PKEY_encapsulate(). That guidance matters because exploitation depends on the application accepting an invalid attacker-controlled RSA public key in the first place, which means environments that already validate imported public keys are in a much better position than applications that treat key material as implicitly trusted. Alongside the moderate-severity RSASVE bug, OpenSSL fixed six low-severity flaws that are more situational but still important for defenders tracking library exposure. These include an out-of-bounds read in AES-CFB-128 on x86-64 systems with AVX-512 and VAES support (CVE-2026-28386), a use-after-free in uncommon DANE client configurations (CVE-2026-28387), a delta CRL NULL dereference (CVE-2026-28388), two CMS NULL dereference issues in KeyAgreeRecipientInfo and KeyTransportRecipientInfo handling (CVE-2026-28389 and CVE-2026-28390), and a heap buffer overflow during oversized OCTET STRING hexadecimal conversion on 32-bit platforms (CVE-2026-31789). Most of those issues primarily create denial-of-service conditions, but they highlight a recurring risk pattern in cryptographic libraries: edge-case parsing and error-handling paths often become attack surfaces when applications process untrusted certificates, CMS objects, CRLs, or public keys. For security teams, the update is a reminder that OpenSSL exposure is not limited to TLS termination alone; mail gateways, certificate-processing tools, CMS/S/MIME services, and custom applications using modern KEM APIs may all need review. OpenSSL said CVE-2026-31790 was reported by Simo Sorce of Red Hat on February 23, 2026, and the fix was developed by Nikola Pajkovsky. Organizations still running affected builds should prioritize patching and add explicit public-key validation to any workflow using RSA-based encapsulation, especially where remote or user-supplied key material can reach the API surface. Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories. RELATED ARTICLESMORE FROM AUTHOR Cyber Attack News FBI Disrupts Russian Router Hijacking Operation Compromised Thousands of Users Cyber Security News Claude Finds 13-Year-Old 0-Day RCE Vulnerability in Apache ActiveMQ in 10 Minutes Cyber Security News CUPS Vulnerability Chain Enables Remote Attacker to Execute Malicious Code as Root User Top 10 Top 10 Best User Access Management Tools in 2026 April 4, 2026 Top 10 Best VPN For Chrome in 2026 April 4, 2026 20 Best Application Performance Monitoring Tools in 2026 April 3, 2026 Top 10 Best VPN For Linux In 2026 April 3, 2026 10 Best VPN For Privacy In 2026 April 2, 2026
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 08, 2026
    Archived
    Apr 08, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗