CVE-2026-28389
Received Received - Intake
NULL Pointer Dereference in OpenSSL CMS Causes Denial of Service

Publication date: 2026-04-07

Last updated on: 2026-04-23

Assigner: OpenSSL Software Foundation

Description
Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service. When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing. Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
openssl openssl From 3.0.0 (inc) to 3.0.20 (exc)
openssl openssl From 3.3.0 (inc) to 3.3.7 (exc)
openssl openssl From 3.4.0 (inc) to 3.4.5 (exc)
openssl openssl From 3.5.0 (inc) to 3.5.6 (exc)
openssl openssl From 3.6.0 (inc) to 3.6.2 (exc)
openssl openssl From 1.0.2 (inc) to 1.0.2zp (exc)
openssl openssl From 1.1.1 (inc) to 1.1.1zg (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs during the processing of a crafted CMS EnvelopedData message that uses KeyAgreeRecipientInfo. Specifically, the issue is a NULL pointer dereference caused by examining the optional parameters field of KeyEncryptionAlgorithmIdentifier without verifying its presence. If this field is missing, the application dereferences a NULL pointer.

This flaw affects applications and services that call CMS_decrypt() on untrusted input, such as S/MIME processing or CMS-based protocols.


How can this vulnerability impact me? :

The vulnerability can cause applications processing attacker-controlled CMS data to crash before authentication or cryptographic operations occur. This results in a Denial of Service (DoS) condition.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability causes a denial of service through a NULL pointer dereference when processing crafted CMS EnvelopedData messages. It affects applications that process attacker-controlled CMS data before authentication or cryptographic operations occur.

However, there is no information provided about the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart