CVE-2022-1343

The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
opensslCNA
---
---
CVEADP
---
---
CISA-ADPADP
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 33%
VendorProductVersion
opensslopenssl
3.0.0 ≤
𝑥
< 3.0.3
netappactive_iq_unified_manager
-
netappclustered_data_ontap
-
netappclustered_data_ontap_antivirus_connector
-
netappsantricity_smi-s_provider
-
netappsmi-s_provider
-
netappsnapmanager
-
netappsolidfire\,_enterprise_sds_\&_hci_storage_node
-
netappsolidfire_\&_hci_management_node
-
netappa250_firmware
-
netappa700s_firmware
-
netappaff_500f_firmware
-
netappaff_8300_firmware
-
netappaff_8700_firmware
-
netappaff_a400_firmware
-
netappfabric-attached_storage_a400_firmware
-
netappfas_500f_firmware
-
netappfas_8300_firmware
-
netappfas_8700_firmware
-
netapph300e_firmware
-
netapph300s_firmware
-
netapph410s_firmware
-
netapph500e_firmware
-
netapph500s_firmware
-
netapph700e_firmware
-
netapph700s_firmware
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
edk2
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
focal
not-affected
bionic
not-affected
xenial
needed
trusty
dne
nodejs
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssl
noble
Fixed 3.0.2-0ubuntu2
released
mantic
Fixed 3.0.2-0ubuntu2
released
lunar
Fixed 3.0.2-0ubuntu2
released
kinetic
Fixed 3.0.2-0ubuntu2
released
jammy
Fixed 3.0.2-0ubuntu1.1
released
impish
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssl1.0
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
focal
dne
bionic
not-affected
xenial
dne
trusty
dne