ABCDEFGHIJKLMNOPQRSTUVWXYZAA
1
The Story So Far: OpenSSL November 1 2022 vulnerabilities fixed in OpenSSL 3.0.7 -CVE -2022-3602, CVE-2022-3786
9/23/2025 13:24:17(UTC -8)
2
aka "The Giant Involuntary SBOM"
3
by @TychoTithonus (Royce Williams) and many contributors
4
5
Goals: before announcement, deduce what we can, and reduce friction of information collection; after announcement, collect and correct
6
Disclaimer: best effort - validate all for your environment/model before use, unofficial sources may be wrong, official sources may be paywalled / unsearchable!
7
Skeptics: Even if this vuln is a big nothingburger, I'd "rather have and not need it than need it and not have it". Also, this work is largely forward-ready for future vulnerabilities 😛
8
9
Contributing:
See GitHub to contribute - options are GitHub PRs, GitHub issues, and Twitter or email (in preferred order)
10
Fast updates will be made here directly, and sync with GitHub is a semi-manual process, with periodic convergence
11
(Official sources (including official forum replies) strongly preferred)
12
13
Tabs in this doc:Overview
This page - updates, scope, technical links, detection tools, mitigation, remediation, news
14
OS-pkg
List of OSes and package frameworks, OpenSSL status and signals
15
Products
List of specific products, OpenSSL status and signals
16
Orgs
List of orgs, with both vuln-specific (TBD) and general convenience links (blog, advisories, Twitter - work in progress
17
Other-SSLs
Other SSL frameworks and their likely and/or confirmed status
18
Older-3.x-CVEs
If your vendor hasn't provided a reference or statement yet, you may be able to infer presence of 3.0.x with these.
19
References
Other references that didn't belong above.
20
TODO
Meta tasks for improving this doc and supporting its mission
21
22
Alternate versions:
Published Google Sheets export (exported HTML for general reading, better performance under load) - share this one (and switch to it unless you need the Sheet tools)
23
Source Google Sheet (with all read-only Sheets tools available if needed - but better because of frozen headers and first columns)
24
Export should be updated every five minutes
25
26
Core info
27
Issue:
OpenSSL has announced an upcoming 'Critical' (rare) vulnerability in OpenSSL 3.0.x, to be announced Tueday November 1st
28
29
CVE:OpenSSL refNVDCVE (MITRE)
30
CVE-2022-3602CVE-2022-3602CVE-2022-3602
31
CVE-2022-3786CVE-2022-3786CVE-2022-3786
32
33
Nickname
"Spooky SSL" is emerging and used by NCSC_NL, but isn't highly prevalent
34
Announcement:
https://www.openssl.org/news/secadv/20221101.txt
Tweet
35
Official blog
https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/
36
Patched Version:3.0.7
Announcement explicitly includes the version number
37
Scheduled time:Nov 1 1300-1700 UTC
World clock timer
5 AM Alaska, 6 AM Pacific, 9 AM Eastern
38
Source:Source tarball
39
CVSS severity?
40
Summary:
See CVE (MITRE) links for now:
CVE-2022-3602CVE-2022-3786
41
42
43
44
Scope:Affects clients?Yes
"In a TLS client, this can be triggered by connecting to a malicious server."
45
Affects servers?Yes
"In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects."
46
Other vectors?
"An attacker can craft a malicious email address to overflow an arbitrary number of bytes containing the `.` character (decimal 46) on the stack."
47
" An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a ial of service) or potentially remote code execution depending on stack layout for any given platform/compiler. ([CVE-2022-3602])
48
"Needs CA to sign malicious cert" - SANS ISC
49
"A: Any OpenSSL 3.0 app that verifies X.509 certs received from untrusted sources should be considered vulnerable"
50
RCE (remote execution)?
Rare
Stack protections on most OSes limit exploitation in practice. TLS client certs required?
51
@MalwareTechBlog:
"[.] but in practice it would be extremely unlikely or even impossible. On a 1-10 scale of was it worth the panic, I'd give it less than zero."
52
LPE (Local escalation)?
Unlikely
Stack protections on most OSes limit exploitation in practice.
53
DoS?Yes, but rare?
54
TCP scanning useful?
55
56
QuicTLS also affected?
See "Other-SSLs" tab as details emerge
57
58
Key references:
NCSC-NL central reference
collab between multiple CERTs, high value, already definitive product list - and definitely watch both GitHub commits and pull requests for early heads-ups!
59
CISA US-CERTsimple page only
60
OpenSSL guidance
61
Matt Tait (@pwnallthethings) analysis:
Twitter threadblog
62
Discoverer ref (SandboxEscaper FTW!)
https://sandboxescaper.blogspot.com/p/disclosures_8.html
just a link to the official announcement
63
SANS ISC guidance
64
What changed (OpenSSL git diff)
65
Repology
OpenSSL package status across many Unix-likes - great reference, not sure how quickly it will show updates
66
Rapid7 AttackerKB analysis & POC:
CVE-2022-3602CVE-2022-3786
67
68
QuestionsIs quictls affected?
69
can you help?
70
71
Last reviewed:
Thu Nov 3 15:26:24 UTC 2022
72
Other dates and times without timezone are Alaska time (UTC -8)
73
74
Key updates (newest first)
75
76
Post-announcement:
77
78
Fri Nov 4 01:28:38 UTC 2022
Added Microsoft MSRC guidance
79
80
Thu Nov 3 15:41:24 UTC 2022
Added Lansweeper detection blog post
81
82
Thu Nov 3 15:24:29 UTC 2022
Added JFrog scripts for detecting use of client certificates as well as vulnerable versions
83
84
Thu Nov 3 04:02:39 UTC 2022
Added forum questions (not yet answered) for Imperva (WAF) and Greenbone (vuln detection)
85
86
Thu Nov 3 03:11:30 UTC 2022
Added Fox-it Suricata GitHub
87
88
Thu Nov 3 01:22:31 UTC 2022
Added Qualys scanner for Windows (GitHub)
89
90
Wed Nov 2 21:30:05 UTC 2022
Added Filippo Valsorda tech post
91
92
Wed Nov 2 21:24:25 UTC 2022
Crowdstrike updated Falcon post
93
94
Tue Nov 1 17:34:25 UTC 2022
Articles, detections, etc surfacing
95
96
Initial flurry contained in core info above
97
98
Announcement:
https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/
99
100