A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | AA | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | The Story So Far: OpenSSL November 1 2022 vulnerabilities fixed in OpenSSL 3.0.7 -CVE -2022-3602, CVE-2022-3786 | 9/23/2025 13:24:17 | (UTC -8) | ||||||||||||||||||||||||
2 | aka "The Giant Involuntary SBOM" | ||||||||||||||||||||||||||
3 | by @TychoTithonus (Royce Williams) and many contributors | ||||||||||||||||||||||||||
4 | |||||||||||||||||||||||||||
5 | Goals: before announcement, deduce what we can, and reduce friction of information collection; after announcement, collect and correct | ||||||||||||||||||||||||||
6 | Disclaimer: best effort - validate all for your environment/model before use, unofficial sources may be wrong, official sources may be paywalled / unsearchable! | ||||||||||||||||||||||||||
7 | Skeptics: Even if this vuln is a big nothingburger, I'd "rather have and not need it than need it and not have it". Also, this work is largely forward-ready for future vulnerabilities 😛 | ||||||||||||||||||||||||||
8 | |||||||||||||||||||||||||||
9 | Contributing: | See GitHub to contribute - options are GitHub PRs, GitHub issues, and Twitter or email (in preferred order) | |||||||||||||||||||||||||
10 | Fast updates will be made here directly, and sync with GitHub is a semi-manual process, with periodic convergence | ||||||||||||||||||||||||||
11 | (Official sources (including official forum replies) strongly preferred) | ||||||||||||||||||||||||||
12 | |||||||||||||||||||||||||||
13 | Tabs in this doc: | Overview | This page - updates, scope, technical links, detection tools, mitigation, remediation, news | ||||||||||||||||||||||||
14 | OS-pkg | List of OSes and package frameworks, OpenSSL status and signals | |||||||||||||||||||||||||
15 | Products | List of specific products, OpenSSL status and signals | |||||||||||||||||||||||||
16 | Orgs | List of orgs, with both vuln-specific (TBD) and general convenience links (blog, advisories, Twitter - work in progress | |||||||||||||||||||||||||
17 | Other-SSLs | Other SSL frameworks and their likely and/or confirmed status | |||||||||||||||||||||||||
18 | Older-3.x-CVEs | If your vendor hasn't provided a reference or statement yet, you may be able to infer presence of 3.0.x with these. | |||||||||||||||||||||||||
19 | References | Other references that didn't belong above. | |||||||||||||||||||||||||
20 | TODO | Meta tasks for improving this doc and supporting its mission | |||||||||||||||||||||||||
21 | |||||||||||||||||||||||||||
22 | Alternate versions: | Published Google Sheets export (exported HTML for general reading, better performance under load) - share this one (and switch to it unless you need the Sheet tools) | |||||||||||||||||||||||||
23 | Source Google Sheet (with all read-only Sheets tools available if needed - but better because of frozen headers and first columns) | ||||||||||||||||||||||||||
24 | Export should be updated every five minutes | ||||||||||||||||||||||||||
25 | |||||||||||||||||||||||||||
26 | Core info | ||||||||||||||||||||||||||
27 | Issue: | OpenSSL has announced an upcoming 'Critical' (rare) vulnerability in OpenSSL 3.0.x, to be announced Tueday November 1st | |||||||||||||||||||||||||
28 | |||||||||||||||||||||||||||
29 | CVE: | OpenSSL ref | NVD | CVE (MITRE) | |||||||||||||||||||||||
30 | CVE-2022-3602 | CVE-2022-3602 | CVE-2022-3602 | ||||||||||||||||||||||||
31 | CVE-2022-3786 | CVE-2022-3786 | CVE-2022-3786 | ||||||||||||||||||||||||
32 | |||||||||||||||||||||||||||
33 | Nickname | "Spooky SSL" is emerging and used by NCSC_NL, but isn't highly prevalent | |||||||||||||||||||||||||
34 | Announcement: | https://www.openssl.org/news/secadv/20221101.txt | Tweet | ||||||||||||||||||||||||
35 | Official blog | https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/ | |||||||||||||||||||||||||
36 | Patched Version: | 3.0.7 | Announcement explicitly includes the version number | ||||||||||||||||||||||||
37 | Scheduled time: | Nov 1 1300-1700 UTC | World clock timer | 5 AM Alaska, 6 AM Pacific, 9 AM Eastern | |||||||||||||||||||||||
38 | Source: | Source tarball | |||||||||||||||||||||||||
39 | CVSS severity | ? | |||||||||||||||||||||||||
40 | Summary: | See CVE (MITRE) links for now: | CVE-2022-3602 | CVE-2022-3786 | |||||||||||||||||||||||
41 | |||||||||||||||||||||||||||
42 | |||||||||||||||||||||||||||
43 | |||||||||||||||||||||||||||
44 | Scope: | Affects clients? | Yes | "In a TLS client, this can be triggered by connecting to a malicious server." | |||||||||||||||||||||||
45 | Affects servers? | Yes | "In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects." | ||||||||||||||||||||||||
46 | Other vectors? | "An attacker can craft a malicious email address to overflow an arbitrary number of bytes containing the `.` character (decimal 46) on the stack." | |||||||||||||||||||||||||
47 | " An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a ial of service) or potentially remote code execution depending on stack layout for any given platform/compiler. ([CVE-2022-3602]) | ||||||||||||||||||||||||||
48 | "Needs CA to sign malicious cert" - SANS ISC | ||||||||||||||||||||||||||
49 | "A: Any OpenSSL 3.0 app that verifies X.509 certs received from untrusted sources should be considered vulnerable" | ||||||||||||||||||||||||||
50 | RCE (remote execution)? | Rare | Stack protections on most OSes limit exploitation in practice. TLS client certs required? | ||||||||||||||||||||||||
51 | @MalwareTechBlog: | "[.] but in practice it would be extremely unlikely or even impossible. On a 1-10 scale of was it worth the panic, I'd give it less than zero." | |||||||||||||||||||||||||
52 | LPE (Local escalation)? | Unlikely | Stack protections on most OSes limit exploitation in practice. | ||||||||||||||||||||||||
53 | DoS? | Yes, but rare? | |||||||||||||||||||||||||
54 | TCP scanning useful? | ||||||||||||||||||||||||||
55 | |||||||||||||||||||||||||||
56 | QuicTLS also affected? | See "Other-SSLs" tab as details emerge | |||||||||||||||||||||||||
57 | |||||||||||||||||||||||||||
58 | Key references: | NCSC-NL central reference | collab between multiple CERTs, high value, already definitive product list - and definitely watch both GitHub commits and pull requests for early heads-ups! | ||||||||||||||||||||||||
59 | CISA US-CERT | simple page only | |||||||||||||||||||||||||
60 | OpenSSL guidance | ||||||||||||||||||||||||||
61 | Matt Tait (@pwnallthethings) analysis: | Twitter thread | blog | ||||||||||||||||||||||||
62 | Discoverer ref (SandboxEscaper FTW!) | https://sandboxescaper.blogspot.com/p/disclosures_8.html | just a link to the official announcement | ||||||||||||||||||||||||
63 | SANS ISC guidance | ||||||||||||||||||||||||||
64 | What changed (OpenSSL git diff) | ||||||||||||||||||||||||||
65 | Repology | OpenSSL package status across many Unix-likes - great reference, not sure how quickly it will show updates | |||||||||||||||||||||||||
66 | Rapid7 AttackerKB analysis & POC: | CVE-2022-3602 | CVE-2022-3786 | ||||||||||||||||||||||||
67 | |||||||||||||||||||||||||||
68 | Questions | Is quictls affected? | |||||||||||||||||||||||||
69 | can you help? | ||||||||||||||||||||||||||
70 | |||||||||||||||||||||||||||
71 | Last reviewed: | Thu Nov 3 15:26:24 UTC 2022 | |||||||||||||||||||||||||
72 | Other dates and times without timezone are Alaska time (UTC -8) | ||||||||||||||||||||||||||
73 | |||||||||||||||||||||||||||
74 | Key updates (newest first) | ||||||||||||||||||||||||||
75 | |||||||||||||||||||||||||||
76 | Post-announcement: | ||||||||||||||||||||||||||
77 | |||||||||||||||||||||||||||
78 | Fri Nov 4 01:28:38 UTC 2022 | Added Microsoft MSRC guidance | |||||||||||||||||||||||||
79 | |||||||||||||||||||||||||||
80 | Thu Nov 3 15:41:24 UTC 2022 | Added Lansweeper detection blog post | |||||||||||||||||||||||||
81 | |||||||||||||||||||||||||||
82 | Thu Nov 3 15:24:29 UTC 2022 | Added JFrog scripts for detecting use of client certificates as well as vulnerable versions | |||||||||||||||||||||||||
83 | |||||||||||||||||||||||||||
84 | Thu Nov 3 04:02:39 UTC 2022 | Added forum questions (not yet answered) for Imperva (WAF) and Greenbone (vuln detection) | |||||||||||||||||||||||||
85 | |||||||||||||||||||||||||||
86 | Thu Nov 3 03:11:30 UTC 2022 | Added Fox-it Suricata GitHub | |||||||||||||||||||||||||
87 | |||||||||||||||||||||||||||
88 | Thu Nov 3 01:22:31 UTC 2022 | Added Qualys scanner for Windows (GitHub) | |||||||||||||||||||||||||
89 | |||||||||||||||||||||||||||
90 | Wed Nov 2 21:30:05 UTC 2022 | Added Filippo Valsorda tech post | |||||||||||||||||||||||||
91 | |||||||||||||||||||||||||||
92 | Wed Nov 2 21:24:25 UTC 2022 | Crowdstrike updated Falcon post | |||||||||||||||||||||||||
93 | |||||||||||||||||||||||||||
94 | Tue Nov 1 17:34:25 UTC 2022 | Articles, detections, etc surfacing | |||||||||||||||||||||||||
95 | |||||||||||||||||||||||||||
96 | Initial flurry contained in core info above | ||||||||||||||||||||||||||
97 | |||||||||||||||||||||||||||
98 | Announcement: | https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/ | |||||||||||||||||||||||||
99 | |||||||||||||||||||||||||||
100 |