7.5
CVSSv3

CVE-2022-0778

Published: 15/03/2022 Updated: 17/05/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

netapp santricity smi-s provider -

netapp storagegrid -

netapp clustered data ontap -

netapp clustered data ontap antivirus connector -

netapp cloud volumes ontap mediator -

netapp a250_firmware -

netapp 500f_firmware -

fedoraproject fedora 35

Vendor Advisories

Synopsis Important: openssl security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openssl is now available for Red Hat Enterprise Linux 74 Advanced Update SupportRed Hat Product Security has rate ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openssl is now available for Red Hat Enterprise Linux 84 Extended Update SupportRed Hat Product Security has rate ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openssl is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openssl is now available for Red Hat Enterprise Linux 82 Extended Update SupportRed Hat Product Security has rate ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openssl is now available for Red Hat Enterprise Linux 77 Advanced Update Support, Red Hat Enterprise Linux 77 Tel ...
Synopsis Important: Red Hat JBoss Web Server 562 Security Update Type/Severity Security Advisory: Important Topic Red Hat JBoss Web Server 562 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft WindowsRed Hat Product Security has rated this release as having a security impact of Importa ...
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form It is possi ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openssl is now available for Red Hat Enterprise Linux 76 Advanced Update Support, Red Hat Enterprise Linux 76 Tel ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openssl is now available for Red Hat Enterprise Linux 81 Update Services for SAP SolutionsRed Hat Product Securit ...
Tavis Ormandy discovered that the BN_mod_sqrt() function of OpenSSL could be tricked into an infinite loop This could result in denial of service via malformed certificates Additional details can be found in the upstream advisory: wwwopensslorg/news/secadv/20220315txt In addition this update corrects a carry propagation bug specific to ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openssl is now available for Red Hat Enterprise Linux 6 Extended Lifecycle SupportRed Hat Product Security has rat ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openssl is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openssl is now available for Red Hat Enterprise Linux 73 Advanced Update SupportRed Hat Product Security has rate ...
Synopsis Important: Red Hat JBoss Web Server 562 Security Update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic Updated Red Hat JBoss Web Server 562 packages are now available for Red Hat Enterprise Linux 7 and Red H ...
Synopsis Moderate: OpenShift Container Platform 4929 bug fix and security update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 4929 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Cont ...
Synopsis Moderate: OpenShift Container Platform 4837 security and extras update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 4837 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Conta ...
Synopsis Moderate: OpenShift Container Platform 41010 security and extras update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 41010 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Con ...
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form It is possi ...
Synopsis Moderate: OpenShift Container Platform 41010 bug fix and security update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 41010 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Co ...
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form It is possi ...
A flaw was found in OpenSSL It is possible to trigger an infinite loop by crafting a certificate that has invalid explicit curve parameters Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack ...
Synopsis Moderate: OpenShift Virtualization 4101 Images security and bug fix update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Virtualization release 4101 is now available with updates to packages and images that fix several bugs and add enhancementsRed Hat Product Security has rated this update as having a securit ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2437 SP11 security update Type/Severity Security Advisory: Important Topic Red Hat JBoss Core Services Apache HTTP Server 2437 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is availableRed Hat Product Securit ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2437 SP11 security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2 ...
Nessus leverages third-party software to help provide underlying functionality One of the third-party components (OpenSSL) was found to contain vulnerabilities, and an updated version has been made available by the provider Out of caution and in line with best practice, Tenable has opted to upgrade OpenSSL to address the potential impact of the ...
Synopsis Moderate: Red Hat OpenShift Logging Security and Bug update Release 541 Type/Severity Security Advisory: Moderate Topic Logging Subsystem 541 - Red Hat OpenShiftRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed se ...
Synopsis Moderate: Red Hat OpenShift Service Mesh 2121 containers security update Type/Severity Security Advisory: Moderate Topic An update for is now available for OpenShift Service Mesh 21Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, whic ...
Synopsis Important: RHV-H security update (redhat-virtualization-host) 4322 Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for redhat-release-virtualization-host and redhat-virtualization-host is now availabl ...
Nessus Agent leverages third-party software to help provide underlying functionality One of the third-party components (OpenSSL) was found to contain vulnerabilities, and an updated version has been made available by the provider Out of caution and in line with best practice, Tenable has opted to upgrade OpenSSL to address the potential impact o ...
Synopsis Important: Red Hat OpenShift GitOps security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat OpenShift GitOps 15 in openshift-gitops-argocd containerRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) bas ...
Synopsis Moderate: Red Hat OpenShift Logging Security and Bug update Release 537 Type/Severity Security Advisory: Moderate Topic Openshift Logging Bug Fix Release (537)Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed seve ...
Synopsis Moderate: Openshift Logging Security and Bug update Release (5210) Type/Severity Security Advisory: Moderate Topic Openshift Logging Bug Fix Release (5210)Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity ...
Tenablesc leverages third-party software to help provide underlying functionality Two of the third-party components (Apache and OpenSSL) were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution, and in line with best practice, Tenable has upgraded the bundled components to address the ...
CVE-2022-0778 Impact of the OpenSSL Infinite Loop Vulnerability CVE-2022-0778 ...
Synopsis Moderate: Migration Toolkit for Containers (MTC) 171 security and bug fix update Type/Severity Security Advisory: Moderate Topic The Migration Toolkit for Containers (MTC) 171 is now availableRed Hat Product Security has rated this update as having a security impactof Moderate A Common Vulnerability Scoring System (CVSS) base s ...
Synopsis Low: Release of OpenShift Serverless Version 1220 Type/Severity Security Advisory: Low Topic OpenShift Serverless version 1220 contains a moderate security impactThe References section contains CVE links providing detailed severity ratings for each vulnerability Ratings are based on a Common Vulnerability Scoring System (CVSS) ...
Synopsis Moderate: OpenShift Container Platform 4657 security and extras update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 4657 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Conta ...
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form It is possi ...
Tenablesc leverages third-party software to help provide underlying functionality Several of the third-party components were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution, and in line with best practice, Tenable has upgraded the bundled components to address the potential impact ...
Synopsis Moderate: Red Hat Advanced Cluster Management 243 security updates and bug fixes Type/Severity Security Advisory: Moderate Topic Red Hat Advanced Cluster Management for Kubernetes 243 General Availability release images This update provides security fixes, bug fixes, and updates the container imagesRed Hat Product Security has ...
CVE-2022-22963 Informational: Impact of Spring Vulnerabilities CVE-2022-22963 and CVE-2010-1622 Bypass ...
Synopsis Moderate: Migration Toolkit for Containers (MTC) 154 security update Type/Severity Security Advisory: Moderate Topic The Migration Toolkit for Containers (MTC) 154 is now availableRed Hat Product Security has rated this update as having a security impactof Moderate A Common Vulnerability Scoring System (CVSS) base score, whichg ...
About Apple security updates For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available Recent releases are listed on the Apple security updates page Apple security documents reference vulnerabilities by CVE-ID&nbsp ...

ICS Advisories

Github Repositories

cve-2022-0778 bad server go run server/maingo --addr 127001:12345 cd test && test_serversh docker stat bad client cd test && test_clientsh go run client/maingo --network tcp --addr 127001:12345 docker stat build docker build -t cve-2022-0778

ASN1 templating for fun and profit Description This tool takes a DER encoded ASN1 structure and outputs the equivalent textual description that can be modified and later be fed to ASN1_generate_nconf(3) in order to build the equivalent DER encoded ASN1 structure It's similar to githubcom/google/der-ascii Example #1 Take an arbitrary DER encoded certificate: $ w

CVE-2022-0778-POC Exploring and exploiting CVE-2022-0778

Docker Mailcatcher using the latest Alpine Linux Status Components & Versions component version Alpine Linux 3151 MailCatcher 082 Ruby 303-r0 SQlite 3-1313 Ruby & SQlite versions may differ as they are updated during the installation of the image Supported Architectures x86_64 arm64 (apple M1, etc) x386, x86_32 arm v7 and v6 Should

A simple remote triggering POC for CVE-2022-0778 Why While trying to validate whether server implementations on our side where/are vulnerable to CVE-2022-0778, it proved extremely cumbersome to do so remotely Instructions to create maliciously crafted certificates to trigger the parsing bug in BN_nod_sqrt() have been around for a while now but the main issue is that most clien

CVE-2022-0778

Hi, I'm Jesús Martinez! Python Developer and Cloud Specialist You can contact me on Linkedin or email me A little more about me { "code": ["Python", "Javascript", "GoLang","Bash"], "databases": ["MySQL", "SQLServer", "PostgreSQL","Aurora"], "

Recent Articles

Critical HP Teradici PCoIP flaws impact 15 million endpoints
BleepingComputer • Bill Toulas • 12 Apr 2022

HP is warning of new critical security vulnerabilities in the Teradici PCoIP client and agent for Windows, Linux, and macOS that impact 15 million endpoints.
The computer and software vendor has found that Teradici is affected by the recently disclosed OpenSSL 
 that causes an infinite denial of service loop and multiple integer overflow vulnerabilities in Expat.
Teradici PCoIP (PC over IP) is a proprietary remote desktop protocol licensed to many virtualization produ...

QNAP Customers Adrift, Waiting on Fix for OpenSSL Bug
Threatpost • Elizabeth Montalbano • 31 Mar 2022

Customers of Taiwan-based QNAP Systems are in a bit of limbo, waiting until the company releases a patch for an OpenSSL bug that the company has warned affects most of its network-attached storage (NAS) devices. The vulnerability can trigger an infinite loop that creates a denial-of-service (DoS) scenario.
Though the bug – tracked as CVE-2022-0778 and rated 7.5 (high severity) on the CVSS severity-rating scale – has been patched by OpenSSL, QNAP hasn’t gotten around to applying a fix...

QNAP warns severe OpenSSL bug affects most of its NAS devices
BleepingComputer • Sergiu Gatlan • 01 Jan 1970

Taiwan-based network-attached storage (NAS) maker QNAP warned on Tuesday that most of its NAS devices are impacted by a
.
Attackers can exploit the vulnerability, tracked as
, to trigger a denial of service state and remotely crash unpatched devices.
Although a patch was released two weeks ago when the bug was publicly disclosed, QNAP explained that its customers would have to wait until the company released its own security updates.
It also urged customers to ins...

References

CWE-835https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83https://www.openssl.org/news/secadv/20220315.txthttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65https://www.debian.org/security/2022/dsa-5103https://lists.debian.org/debian-lts-announce/2022/03/msg00024.htmlhttps://lists.debian.org/debian-lts-announce/2022/03/msg00023.htmlhttps://security.netapp.com/advisory/ntap-20220321-0002/https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002https://www.tenable.com/security/tns-2022-06https://www.tenable.com/security/tns-2022-07https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/https://www.tenable.com/security/tns-2022-08https://www.oracle.com/security-alerts/cpuapr2022.htmlhttps://www.tenable.com/security/tns-2022-09https://security.netapp.com/advisory/ntap-20220429-0005/https://support.apple.com/kb/HT213256https://support.apple.com/kb/HT213255https://support.apple.com/kb/HT213257http://seclists.org/fulldisclosure/2022/May/38http://seclists.org/fulldisclosure/2022/May/35http://seclists.org/fulldisclosure/2022/May/33https://github.com/yywing/cve-2022-0778https://github.com/wllm-rbnt/asn1templatehttps://nvd.nist.govhttps://threatpost.com/qnap-customers-adrift-fix-openssl-bug/179197/https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-02https://alas.aws.amazon.com/ALAS-2022-1575.html