Skip to main content
Skip table of contents

OpenSSL advisory vulnerability

General information

This article contains information related to CVE-2022-3602, which is a buffer overrun vulnerability that could cause denial of service or potentially RCE.

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a certificate authority (CA) to have signed the malicious certificate, or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution.

Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).

This CVE was first published 2022-11-01, pre-announcements gave it the score CRITICAL, but further analysis during 2022-11-02 has downgraded it to HIGH. Official NVD score is not yet published.


Official sites for the CVE:

https://nvd.nist.gov/vuln/detail/CVE-2022-3602

The Nexus Security team has investigated the impact of CVE-2022-3602, and the possible impact on our components. The component-specific information is added in the table below, and as can be seen, none of Nexus components are affected.

Nexus components

This list contains the components from Nexus, and their respective affected versions.

Latest update date of this article

2022-11-03


Table of contents


Component

Affected versions CVE-2022-3602

Comment

Smart ID Certificate Manager

Not affectedRecommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Nexus OCSP Responder

Not affectedRecommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Nexus Timestamp Server

Not affectedRecommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Smart ID Desktop App/Client

Not affected

Uses OpenSSL 1.1.1 which is not affected.

Recommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Smart ID Mobile AppNot affected

Nexus Card SDK

Not affected

Uses OpenSSL 1.1.1 which is not affected.

Recommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Smart ID Physical Access

Not affected

Uses OpenSSL 1.1.1 which is not vulnerable.

Recommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Smart ID Digital Access (previously named Hybrid Access Gateway – HAG)

Not affected

Uses OpenSSL 1.1.1 which is not vulnerable.

Recommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Smart ID Identity Manager/PRIME

Not affected

Uses OpenSSL 1.1.1 which is not vulnerable.

Recommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Smart ID Self-Service (Angular/SpringBoot-based)

Not affected

Uses OpenSSL 1.1.1 which is not vulnerable.

Recommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Smart ID Self-Service Legacy USSP (Wicket-based)Not affected

Uses OpenSSL 1.1.1 which is not vulnerable.

Recommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Smart ID Messaging component - Hermod

Not affected

Uses OpenSSL 1.1.1 which is not vulnerable.

Recommendation is to check underlaying OS in your installation for OpenSSL version, and upgrade if applicable.

Nexus ID06 ServiceNot affectedUses OpenSSL 1.1.1 which is not vulnerable.
Nexus Go CardsNot affectedUses OpenSSL 1.1.1 which is not vulnerable.

Further information

Technical information about the vulnerability

In order to be impacted by this vulnerability the victim (client or server) needs a few conditions to be true:

  • A malicious certificate needs to be signed by a CA that the victim trusts
  • The victim needs to validate the malicious certificate or ignore a series of warnings from the browser
  • The victim needs to be running OpenSSL 3.0.x before 3.0.7

For a client to be affected by this vulnerability, they would have to visit a malicious site that presents a certificate containing an exploit payload. In addition, this malicious certificate would have to be signed by a trusted CA.

Servers with a vulnerable version of OpenSSL can be attacked if they support mutual authentication - a scenario where both client and a server provide a valid and signed X.509 certificate, and the client is able to present a certificate with an exploit payload to the server.

How should you handle this issue?

If you are managing services that run OpenSSL, you should patch vulnerable OpenSSL packages. On a Linux system you can determine if you have any processes dynamically loading OpenSSL with the lsof command. Here is an example of finding OpenSSL being used by NGINX:

CODE
root@55f64f421576:/# lsof | grep libssl.so.3
nginx   1294     root  mem       REG              254,1           925009 /usr/lib/x86_64-linux-gnu/libssl.so.3 (path dev=0,142)


Once the package maintainers for your Linux distro release OpenSSL 3.0.7 you can patch by updating your package sources and upgrading the libssl3 package. On Debian and Ubuntu this can be done with the apt-get upgrade command:

CODE
root@55f64f421576:/# apt-get --only-upgrade install libssl3

With that said, it is possible that you could be running a vulnerable version of OpenSSL that the lsof command cannot find because your process is statically compiled. It is important to update your statically compiled software that you are responsible for maintaining, and make sure that over the coming days you are updating your operating system and other installed software that might contain the vulnerable OpenSSL versions.

Nexus strongly recommends you to contact your other suppliers as well.


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.