CVE-2026-28386
Received Received - Intake
Out-of-Bounds Read in OpenSSL AES-CFB128 on AVX-512 Systems

Publication date: 2026-04-07

Last updated on: 2026-04-24

Assigner: OpenSSL Software Foundation

Description
Issue summary: Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support can trigger an out-of-bounds read of up to 15 bytes when processing partial cipher blocks. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application if the input buffer ends at a memory page boundary and the following page is unmapped. There is no information disclosure as the over-read bytes are not written to output. The vulnerable code path is only reached when processing partial blocks (when a previous call left an incomplete block and the current call provides fewer bytes than needed to complete it). Additionally, the input buffer must be positioned at a page boundary with the following page unmapped. CFB mode is not used in TLS/DTLS protocols, which use CBC, GCM, CCM, or ChaCha20-Poly1305 instead. For these reasons the issue was assessed as Low severity according to our Security Policy. Only x86-64 systems with AVX-512 and VAES instruction support are affected. Other architectures and systems without VAES support use different code paths that are not affected. OpenSSL FIPS module in 3.6 version is affected by this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-24
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openssl openssl From 3.6.0 (inc) to 3.6.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in applications using AES-CFB128 encryption or decryption on x86-64 systems that support AVX-512 and VAES instructions. When processing partial cipher blocks, an out-of-bounds read of up to 15 bytes can be triggered.

The issue arises only when a previous call left an incomplete block and the current call provides fewer bytes than needed to complete it, and when the input buffer ends exactly at a memory page boundary with the following page unmapped.

This out-of-bounds read does not disclose information because the over-read bytes are not written to output, but it may cause the application to crash.


How can this vulnerability impact me? :

The primary impact of this vulnerability is a potential Denial of Service (DoS) condition. If triggered, the out-of-bounds read may cause the application to crash.

This crash happens only under specific conditions: when processing partial cipher blocks with input buffers positioned at a page boundary and the following memory page is unmapped.

There is no risk of information disclosure from this vulnerability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support when processing partial cipher blocks.

Since the vulnerable code path is only triggered when processing partial blocks and the input buffer is positioned at a memory page boundary with the following page unmapped, ensuring that input buffers do not end at page boundaries or avoiding partial block processing can reduce risk.

Additionally, consider updating or patching the OpenSSL FIPS module if a fixed version becomes available.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability described in CVE-2026-28386 causes an out-of-bounds read that may lead to a Denial of Service (DoS) but does not result in information disclosure.

Since there is no data leakage or compromise of sensitive information, the impact on compliance with standards such as GDPR or HIPAA, which focus heavily on protecting personal and sensitive data, is minimal.

However, the potential for application crashes due to DoS could affect availability requirements in some regulatory frameworks, but this is assessed as a low severity issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart