VulnerabilitiesMEDIUM

OpenSSL 3.6.2 - Eight CVEs Fixed in Latest Release

Featured image for OpenSSL 3.6.2 - Eight CVEs Fixed in Latest Release
#OpenSSL#CVE-2026-31790#CVE-2026-2673#CVE-2026-28386#CVE-2026-28387

Original Reporting

HNHelp Net Security·Sinisa Markovic

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelMEDIUM

Moderate risk — monitor and plan remediation

🛡️
🛡️ VULNERABILITY DETAILS
CVE IDCVE-2026-31790
CVSS ScoreModerate
Severity RatingModerate
Affected ProductOpenSSL 3.6.x, 3.5.x
VendorOpenSSL Project
Vulnerability TypeVarious
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Actively ExploitedNot yet observed
Patch AvailableYes
Workaround Available
🎯

Basically, OpenSSL fixed eight security issues in its latest update.

Quick Summary

OpenSSL has released version 3.6.2, fixing eight CVEs, including critical vulnerabilities. Users of versions 3.6 and 3.5 should update immediately to ensure security.

What Happened

OpenSSL has released version 3.6.2, which includes patches for eight CVEs across various components. The most severe issue is rated as Moderate. This update is crucial for users to maintain the security of their systems.

What Got Fixed

The release addresses several vulnerabilities:

  • CVE-2026-31790: Fixes incorrect failure handling in RSA KEM RSASVE encapsulation.
  • CVE-2026-2673: Resolves a loss of key agreement group structure when using the DEFAULT keyword in server-side configurations.
  • CVE-2026-28386: Addresses an out-of-bounds read in AES-CFB-128 on x86-64 CPUs with AVX-512 support.
  • CVE-2026-28387: Fixes a potential use-after-free in DANE client code.
  • CVE-2026-28388: Resolves a NULL pointer dereference when processing a delta CRL.
  • CVE-2026-28389 and CVE-2026-28390: Fix two NULL dereference bugs in CMS recipient info handling.
  • CVE-2026-31789: Addresses a heap buffer overflow in hexadecimal conversion.

Scope and Affected Versions

Versions 3.6 and 3.5 of OpenSSL are vulnerable to these issues. However, versions 3.4, 3.3, 3.0, 1.0.2, and 1.1.1 are not affected by some of these CVEs. Administrators running 3.6.x on x86-64 systems with AVX-512 enabled should prioritize the fix for AES-CFB-128 due to the memory-read exposure.

Regression Repairs

In addition to the CVE fixes, OpenSSL 3.6.2 addresses two behavioral regressions introduced in version 3.6.0. These include restoring the pre-3.6.0 behavior of the X509_V_FLAG_CRL_CHECK_ALL flag and fixing a regression related to stapled OCSP responses that caused handshake failures.

What You Should Do

If you're using OpenSSL, it is vital to update to version 3.6.2 to mitigate these vulnerabilities. Ensure that your systems are running the latest version to protect against potential exploits. Regularly check for updates and apply them promptly to maintain security.

🔍 How to Check If You're Affected

  1. 1.Check your OpenSSL version using the command 'openssl version'.
  2. 2.Review the CVE list to see if your version is affected.
  3. 3.Apply the latest patch from the OpenSSL website.
  4. 4.Monitor for any unusual activity related to OpenSSL usage.

🏢 Impacted Sectors

Technology

Pro Insight

🔒 Pro insight: The fixes in OpenSSL 3.6.2 address critical vulnerabilities that could be exploited, emphasizing the need for timely updates.

Sources

Original Report

HNHelp Net Security· Sinisa Markovic
Read Original

Related Pings

CRITICALVulnerabilities

CVE-2026-35616 - Fortinet FortiClientEMS Vulnerability Exploited

A critical zero-day vulnerability in Fortinet's FortiClientEMS is being exploited. Immediate hotfixes are available to protect affected users. Don't delay in securing your systems!

Tenable Blog·
CRITICALVulnerabilities

Ninja Forms - Critical Flaw Allows Remote Code Execution

A critical flaw in the Ninja Forms plugin for WordPress allows attackers to upload harmful files. With over 600,000 downloads, users must update immediately to avoid exploitation.

BleepingComputer·
CRITICALVulnerabilities

VMware Security Advisory - Critical Vulnerabilities Identified

VMware has issued a critical security advisory for its Tanzu products, urging immediate updates. Affected versions prior to MySQL for Kubernetes 2.0.2 must be patched. Don't risk security vulnerabilities!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Erlang Security Advisory - Critical Vulnerabilities Addressed

Erlang's latest security advisory reveals critical vulnerabilities in its software. Users must update to secure versions to protect their systems from potential exploits. Don't delay in applying these necessary fixes!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Microsoft Edge - Critical Security Advisory Released

Microsoft has released a critical security advisory for Edge due to a vulnerability that could be exploited. Users are urged to update immediately. Mozilla has also issued advisories for Firefox vulnerabilities.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Severe StrongBox Vulnerability Patched in Android Update

Android has patched a critical DoS vulnerability and a high-severity flaw in StrongBox. These issues could disrupt services and expose sensitive data. Users should update their devices immediately.

SecurityWeek·