Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code

Posted on January 28, 2026January 28, 2026 By CWS

OpenSSL patched 12 vulnerabilities on January 27, 2026, together with one high-severity flaw that might result in distant code execution. Most points trigger denial-of-service assaults however spotlight dangers in parsing untrusted knowledge.

Essentially the most critical concern, CVE-2025-15467, hits CMS AuthEnvelopedData parsing with AEAD ciphers like AES-GCM. Attackers craft outsized IVs in ASN.1 parameters, inflicting stack overflows earlier than authentication checks. This results in crashes or potential distant code execution on apps dealing with untrusted CMS or PKCS#7 knowledge, corresponding to S/MIME.

Apps parsing distant CMS content material face excessive threat since no secret’s wanted to set off the overflow. Exploitability is determined by platform defenses like ASLR, however the stack write primitive poses extreme hazard. OpenSSL rated it Excessive severity.

CVE-2025-11187 includes improper PBMAC1 validation in PKCS#12 recordsdata, resulting in stack overflows or null dereferences in variations 3.6 to three.4. Malicious recordsdata set off buffer overflows throughout key derivation if keylength exceeds 64 bytes.

A number of low-severity points like CVE-2025-69419, CVE-2025-69421, and CVE-2026-22795 additionally hit PKCS#12 dealing with, inflicting out-of-bounds writes or null derefs.

CVE IDSeverityBrief ImpactAffected VersionsPatched VersionsCVE-2025-11187ModerateStack overflow in PKCS#12 MAC3.6, 3.5, 3.43.6.1, 3.5.5, 3.4.4 CVE-2025-15467HighStack overflow in CMS parsing3.6-3.03.6.1, 3.5.5, 3.4.4, 3.3.6, 3.0.19 CVE-2025-15468LowNull deref in QUIC cipher lookup3.6, 3.5, 3.4, 3.33.6.1, 3.5.5, 3.4.4, 3.3.6 CVE-2025-15469Lowdgst device truncates massive inputs3.6, 3.53.6.1, 3.5.5 CVE-2025-66199LowTLS 1.3 cert compression DoS3.6, 3.5, 3.4, 3.33.6.1, 3.5.5, 3.4.4, 3.3.6 CVE-2025-68160LowHeap OOB write in BIO linebuffer3.6-3.0, 1.1.1, 1.0.23.6.1-3.0.19, 1.1.1ze, 1.0.2zn CVE-2025-69418LowOCB tail bytes unencrypted3.6-3.0, 1.1.13.6.1-3.0.19, 1.1.1ze CVE-2025-69419LowOOB write in PKCS12 friendlyname3.6-3.0, 1.1.13.6.1-3.0.19, 1.1.1ze CVE-2025-69420LowNull deref in timestamp verify3.6-3.0, 1.1.13.6.1-3.0.19, 1.1.1ze CVE-2025-69421LowNull deref in PKCS12 decrypt3.6-3.0, 1.1.1, 1.0.23.6.1-3.0.19, 1.1.1ze, 1.0.2zn CVE-2026-22795LowType confusion in PKCS#123.6-3.0, 1.1.13.6.1-3.0.19, 1.1.1ze CVE-2026-22796LowType confusion in PKCS7 digest3.6-3.0, 1.1.1, 1.0.23.6.1-3.0.19, 1.1.1ze, 1.0.2zn

These hit parsing untrusted PKCS#12, PKCS#7, timestamps, or area of interest APIs. Most want crafted inputs, limiting distant exploits to particular setups, reads the advisory.

Vulnerabilities span OpenSSL 3.6 to 1.0.2, excluding older branches with out options like PBMAC1 or QUIC. FIPS modules keep protected because the affected code sits exterior boundaries.

VersionVulnerable CVEsFixed Version3.6All besides 1.0.2-specific3.6.1 ​3.5Most3.5.5 ​3.4Most3.4.43.3Several3.3.63.0CMS, BIO, and so forth.3.0.191.1.1BIO, OCB, PKCS#121.1.1ze (premium) ​1.0.2BIO, PKCS#71.0.2zn (premium)

Aisle Analysis discovered practically all flaws, with Stanislav Fort reporting probably the most. Others credit score Luigino Camastra, Petr Šimeček, Tomas Dulka, and Hamza (Metadust). Fixes by Tomas Mraz, Igor Ustinov, and so forth.

Mitigation Steps

Improve instantly: 3.6.1, 3.5.5, and so forth. Keep away from untrusted PKCS#12/CMS inputs; validate file sizes. For TLS 1.3 compression, set SSL_OP_NO_RX_CERTIFICATE_COMPRESSION. Servers parsing S/MIME or timestamps ought to patch first because of distant dangers.

OpenSSL powers net servers, VPNs, and crypto instruments worldwide. Fast updates forestall DoS or worse in manufacturing. Test dependencies by way of package deal managers.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Code, Execute, Malicious, OpenSSL, Remote, Vulnerabilities

Post navigation

Previous Post: Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
Next Post: WhatsApp New Strict Account Settings Option to Protect Your Account from Hackers

Related Posts

CISA Warns of Threat Actors Leveraging Commercial Spyware to Target Users of Signal and WhatsApp Cyber Security News
Akira and Lynx Ransomware Attacking Managed Service Providers With Stolen Login Credential and Vulnerabilities Cyber Security News
Top 10 Best Endpoint Security Tools Cyber Security News
Pro-Iranian Hacktivists Targeting US Networks Department of Homeland Security Warns Cyber Security News
Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware Cyber Security News
Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • High-Severity Remote Code Execution Vulnerability Patched in OpenSSL
  • WhatsApp New Strict Account Settings Option to Protect Your Account from Hackers
  • OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code
  • Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
  • Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • High-Severity Remote Code Execution Vulnerability Patched in OpenSSL
  • WhatsApp New Strict Account Settings Option to Protect Your Account from Hackers
  • OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code
  • Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
  • Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark