Cyber Posture

CVE-2026-28390

High

Published: 07 April 2026

Published
07 April 2026
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0004 12.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Issue summary: During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service. When…

more

a CMS EnvelopedData message that uses KeyTransportRecipientInfo with RSA-OAEP encryption is processed, the optional parameters field of RSA-OAEP SourceFunc algorithm identifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing. Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and patching of the NULL pointer dereference flaw in OpenSSL's CMS_decrypt processing of crafted EnvelopedData messages.

prevent

Mandates error handling that prevents crashes from missing optional parameters in RSA-OAEP algorithm identifiers during CMS processing.

prevent

Enforces validation of untrusted CMS EnvelopedData inputs to block malformed KeyTransportRecipientInfo structures that trigger the NULL dereference.

Security SummaryAI

CVE-2026-28390 is a NULL pointer dereference vulnerability in OpenSSL during the processing of a crafted CMS EnvelopedData message that uses KeyTransportRecipientInfo with RSA-OAEP encryption. The issue occurs because the optional parameters field of the RSA-OAEP SourceFunc algorithm identifier is examined without first checking for its presence, leading to the dereference. Applications and services that call CMS_decrypt() on untrusted input, such as those handling S/MIME processing or CMS-based protocols, are affected. OpenSSL FIPS modules in versions 3.6, 3.5, 3.4, 3.3, and 3.0 are not vulnerable, as the affected code lies outside the FIPS module boundary.

A remote attacker with network access and no privileges required can exploit this vulnerability by supplying a malicious CMS EnvelopedData message to a vulnerable application. Successful exploitation triggers a crash before any authentication or cryptographic operations complete, resulting in a denial of service. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-476 (NULL Pointer Dereference).

Mitigation is available through patches in OpenSSL, as detailed in the following upstream commit references: https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc, https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6, https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4, https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788, and https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75. Security practitioners should update to a patched version of OpenSSL and review applications for exposure to untrusted CMS data.

Details

CWE(s)

Affected Products

openssl
openssl
1.0.2 — 1.0.2zp · 1.1.1 — 1.1.1zg · 3.0.0 — 3.0.20

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

NULL pointer dereference in OpenSSL CMS_decrypt() on untrusted input enables remote crash/DoS with no privileges or auth required, directly matching Application or System Exploitation for Endpoint Denial of Service.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References