CWE · MITRE source
CWE-599Missing Validation of OpenSSL Certificate
The product uses OpenSSL and trusts or uses a certificate without using the SSL_get_verify_result() function to ensure that the certificate satisfies all necessary security requirements.
This could allow an attacker to use an invalid certificate to claim to be a trusted host, use expired certificates, or conduct other attacks that could be detected if the certificate is properly validated.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2025-12553 | 2.0 | 9.8 | 0.0004 | 2025-10-31 |
CVE-2024-40464 | 1.8 | 8.8 | 0.0075 | 2024-07-31 |
CVE-2022-31105 | 1.7 | 8.3 | 0.0025 | 2022-07-12 |
CVE-2021-21374 | 1.6 | 8.1 | 0.0031 | 2021-03-26 |
CVE-2026-25060 | 1.6 | 8.1 | 0.0001 | 2026-02-02 |
CVE-2023-48052 | 1.5 | 7.4 | 0.0011 | 2023-11-16 |
CVE-2024-41265 | 1.5 | 7.5 | 0.0014 | 2024-08-01 |
CVE-2025-56230 | 1.5 | 7.5 | 0.0004 | 2025-11-04 |
CVE-2024-36755 | 1.4 | 6.8 | 0.0012 | 2024-06-27 |
CVE-2024-41253 | 1.4 | 7.1 | 0.0008 | 2024-07-31 |
CVE-2025-56232 | 1.4 | 6.8 | 0.0002 | 2025-11-05 |
CVE-2025-56146 | 1.1 | 5.3 | 0.0003 | 2025-09-23 |
CVE-2025-63432 | 0.9 | 4.6 | 0.0004 | 2025-11-24 |