VulnerabilitiesMEDIUM

OpenSSL Vulnerabilities - Sensitive Data Exposed in RSA KEM

Featured image for OpenSSL Vulnerabilities - Sensitive Data Exposed in RSA KEM
#OpenSSL#CVE-2026-31790#RSA KEM#cryptographic libraries#data leakage

Original Reporting

CSCyber Security News·Guru Baran

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelMEDIUM

Moderate risk — monitor and plan remediation

🛡️
🛡️ VULNERABILITY DETAILSCVE-2026-31790CVSS: 5
CVE IDCVE-2026-31790
CVSS Score5.0 / 10 (Moderate)
Severity RatingModerate
Affected ProductOpenSSL 3.0, 3.3, 3.4, 3.5, 3.6
VendorOpenSSL
Vulnerability TypeLogic Error in RSA KEM Handling
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Actively ExploitedNot yet observed
Patch AvailableYes
Workaround AvailableYes
🎯

Basically, OpenSSL had flaws that could leak sensitive data due to bad coding in its encryption process.

Quick Summary

OpenSSL's April 2026 update addresses critical vulnerabilities, particularly CVE-2026-31790. This flaw can leak sensitive data through improper RSA KEM handling. Users are urged to patch immediately to protect their systems.

What Happened

OpenSSL has released a significant security update in April 2026, addressing seven vulnerabilities across its supported branches. The most critical among these is CVE-2026-31790, a moderate-severity flaw related to RSA KEM RSASVE encapsulation, which can potentially expose uninitialized memory to malicious actors.

The Flaw

The vulnerability arises when applications use EVP_PKEY_encapsulate() to derive a shared secret from an attacker-supplied RSA public key without proper validation. The underlying issue is a logic error in the return-value check of the RSA_public_encrypt() function. While it returns -1 on failure, the affected code only checks for non-zero values, leading to a situation where encapsulation appears successful even when it has failed. This oversight can allow sensitive data from previous executions to be sent back to a peer, effectively leaking information.

What's at Risk

The flaw affects various versions of OpenSSL, specifically 3.0, 3.3, 3.4, 3.5, and 3.6. However, versions 1.0.2 and 1.1.1 are not impacted. The vulnerability is particularly concerning for applications in regulated environments that rely on validated cryptographic boundaries, such as those using FIPS modules.

Patch Status

OpenSSL recommends users of vulnerable 3.x releases upgrade to versions 3.0.20, 3.3.7, 3.4.5, 3.5.6, or 3.6.2, depending on their current branch. Additionally, they advise implementing checks with EVP_PKEY_public_check() or EVP_PKEY_public_check_quick() before calling EVP_PKEY_encapsulate(), as this can mitigate the risk by ensuring that only valid RSA public keys are processed.

Immediate Actions

Organizations should take the following steps to protect themselves:

  • Upgrade to the latest OpenSSL version as soon as possible.
  • Implement public key validation in workflows that utilize RSA-based encapsulation.
  • Review applications that may use the affected OpenSSL APIs to ensure they are not accepting unvalidated keys.

Conclusion

The vulnerabilities in OpenSSL serve as a reminder that cryptographic libraries can harbor risks, especially when applications process untrusted inputs. Security teams should remain vigilant and ensure their systems are updated to avoid potential data leakage incidents. OpenSSL's advisory highlights the importance of proper validation and error handling in cryptographic operations.

🔍 How to Check If You're Affected

  1. 1.Check if your OpenSSL version is 3.0, 3.3, 3.4, 3.5, or 3.6.
  2. 2.Review application code for proper public key validation before RSA operations.
  3. 3.Monitor for any unusual behavior in applications using OpenSSL APIs.

🏢 Impacted Sectors

TechnologyFinanceHealthcare

Pro Insight

🔒 Pro insight: The flawed encapsulation logic underscores the critical need for rigorous input validation in cryptographic implementations to prevent data leakage.

Sources

Original Report

CSCyber Security News· Guru Baran
Read Original

Related Pings

HIGHVulnerabilities

Apache ActiveMQ Bug - Hidden for 13 Years Discovered

A hidden vulnerability in Apache ActiveMQ Classic has been discovered, allowing remote code execution. Organizations must update their systems urgently to avoid exploitation.

Infosecurity Magazine·
HIGHVulnerabilities

Claude Mythos - Identifies Thousands of Zero-Day Flaws

Anthropic's Claude Mythos has found thousands of zero-day vulnerabilities across major systems. This initiative aims to address these critical security flaws before they can be exploited. With significant funding for security efforts, the focus is on proactive measures.

The Hacker News·
HIGHVulnerabilities

Flatpak 1.16.4 - Critical Sandbox Escape Fixed

Flatpak has released version 1.16.4, fixing four security vulnerabilities, including a critical sandbox escape. Users should update immediately to prevent potential host file access and code execution risks.

Help Net Security·
MEDIUMVulnerabilities

OpenSSL 3.6.2 - Eight CVEs Fixed in Latest Release

OpenSSL has released version 3.6.2, fixing eight CVEs, including critical vulnerabilities. Users of versions 3.6 and 3.5 should update immediately to ensure security.

Help Net Security·
CRITICALVulnerabilities

Ninja Forms - Critical Flaw Allows Remote Code Execution

A critical flaw in the Ninja Forms plugin for WordPress allows attackers to upload harmful files. With over 600,000 downloads, users must update immediately to avoid exploitation.

BleepingComputer·
CRITICALVulnerabilities

VMware Security Advisory - Critical Vulnerabilities Identified

VMware has issued a critical security advisory for its Tanzu products, urging immediate updates. Affected versions prior to MySQL for Kubernetes 2.0.2 must be patched. Don't risk security vulnerabilities!

Canadian Cyber Centre Alerts·