Home

Description

Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service. When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing. Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.

PUBLISHED Reserved 2026-02-27 | Published 2026-04-07 | Updated 2026-04-15 | Assigner openssl

Problem types

CWE-476 NULL Pointer Dereference

Product status

Default status
unaffected

3.6.0 (semver) before 3.6.2
affected

3.5.0 (semver) before 3.5.6
affected

3.4.0 (semver) before 3.4.5
affected

3.3.0 (semver) before 3.3.7
affected

3.0.0 (semver) before 3.0.20
affected

1.1.1 (custom) before 1.1.1zg
affected

1.0.2 (custom) before 1.0.2zp
affected

Credits

Nathan Sportsman (Praetorian) reporter

Daniel Rhea reporter

Jaeho Nam (Seoul National University) reporter

Muhammad Daffa reporter

Zhanpeng Liu (Tencent Xuanwu Lab) reporter

Guannan Wang (Tencent Xuanwu Lab) reporter

Guancheng Li (Tencent Xuanwu Lab) reporter

Joshua Rogers (Aisle Research) reporter

Neil Horman remediation developer

References

openssl-library.org/news/secadv/20260407.txt (OpenSSL Advisory) vendor-advisory

github.com/...ommit/f80f83bc5fd036bc47d773e8b15a001e2b4ce686 (3.6.2 git commit) patch

github.com/...ommit/16cea4188e0ea567deb4f93f85902247e67384f5 (3.5.6 git commit) patch

github.com/...ommit/785cbf7ea3b5a6f5adf0c1ccb92b79d89c35c616 (3.4.5 git commit) patch

github.com/...ommit/c6725634e089eb2b634b10ede33944be7248172a (3.3.7 git commit) patch

github.com/...ommit/7b5274e812400cacb6f3be4c2df5340923fa807f (3.0.20 git commit) patch

cve.org (CVE-2026-28389)

nvd.nist.gov (CVE-2026-28389)

Download JSON