Vulnerability Name:

CVE-2022-0778 (CCN-221911)

Assigned:2022-03-15
Published:2022-03-15
Updated:2022-11-09
Summary:The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.7 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-835
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2022-0778

Source: MISC
Type: Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4

Source: CCN
Type: Red Hat Bugzilla - Bug 2062202
(CVE-2022-0778) - CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates

Source: CONFIRM
Type: Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf

Source: XF
Type: UNKNOWN
openssl-cve20220778-dos(221911)

Source: CONFIRM
Type: Mailing List, Patch, Vendor Advisory
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65

Source: CONFIRM
Type: Broken Link
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83

Source: CONFIRM
Type: Mailing List, Patch, Vendor Advisory
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-9e88b5d8d7

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-a5f51502f0

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-8bb51f6901

Source: CCN
Type: Node.js Blog, 2022-03-18
OpenSSL security releases require Node.js security releases

Source: CCN
Type: Packet Storm Security [06-01-2022]
OpenSSL 1.0.2 / 1.1.1 / 3.0 BN_mod_sqrt() Infinite Loop

Source: CONFIRM
Type: Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002

Source: GENTOO
Type: Third Party Advisory
GLSA-202210-02

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20220321-0002/

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20220429-0005/

Source: CCN
Type: Apple security document HT213255
About the security content of Security Update 2022-004 Catalina

Source: CCN
Type: Apple security document HT213256
About the security content of macOS Big Sur 11.6.6

Source: CCN
Type: Apple security document HT213257
About the security content of macOS Monterey 12.4

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT213255

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT213256

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT213257

Source: CCN
Type: ICSA-22-167-14
Siemens OpenSSL Affected Industrial Products (Update D)

Source: CCN
Type: ICSA-22-272-02
Hitachi Energy MicroSCADA Pro X SYS600

Source: DEBIAN
Type: Third Party Advisory
DSA-5103

Source: CCN
Type: IBM Security Bulletin 6572427 (Voice Gateway)
Multiple Vulnerabilities in node.js

Source: CCN
Type: IBM Security Bulletin 6572439 (i)
OpenSSL for IBM i is vulnerable to a denial of service due to a flaw in the BN_mod_sqrt() function (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6573713 (App Connect Professional)
Vulnerability in OpenSSL affect App Connect Professional.

Source: CCN
Type: IBM Security Bulletin 6576015 (App Connect Enterprise Certified Container)
IBM App Connect Enterprise Certified Container operands may be vulnerable to denial of service due to CVE-2022-0778

Source: CCN
Type: IBM Security Bulletin 6584089 (Business Automation Workflow)
Security vulnerabilities in IBM SDK for Node.js might affect the configuration editor used by IBM Business Automation Workflow and IBM Business Process Manager (BPM)

Source: CCN
Type: IBM Security Bulletin 6584215 (Watson Discovery)
IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in OpenSSL

Source: CCN
Type: IBM Security Bulletin 6585724 (WebSphere MQ)
WebSphere MQ for HP NonStop Server is affected by OpenSSL vulnerability CVE-2022-0778

Source: CCN
Type: IBM Security Bulletin 6586112 (AIX)
AIX is vulnerable to a denial of service due to OpenSSL (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6586152 (InfoSphere Information Server)
A vulnerability in OpenSSL affects IBM InfoSphere Information Server (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6586492 (MQ Operator CD release)
IBM MQ Operator and Queue manager container images are vulnerable to multiple vulnerabilities from expat, Golang Go, gcc, openssl and libxml.

Source: CCN
Type: IBM Security Bulletin 6587030 (MobileFirst Foundation)
OpenSSL publicly disclosed vulnerability affects IBM MobileFirst Platform Foundation

Source: CCN
Type: IBM Security Bulletin 6587036 (Sterling Connect:Express for UNIX)
IBM Sterling Connect:Express for UNIX is vulnerable to denial of service due to OpenSSL (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6588819 (MQ for HPE NonStop)
IBM MQ for HPE NonStop Server is affected by OpenSSL vulnerability CVE-2022-0778

Source: CCN
Type: IBM Security Bulletin 6590851 (Hardware Management Console)
Vulnerability in OpenSSL (CVE-2022-0778) affects Power HMC

Source: CCN
Type: IBM Security Bulletin 6591059 (Watson Explorer)
Vulnerability in OpenSSL affects IBM Watson Explorer (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6592169 (Netezza Host Management)
Public disclosed vulnerability from OpenSSL affects IBM Netezza Host Management

Source: CCN
Type: IBM Security Bulletin 6592587 (WIoTP MessageGateway)
Multiple vulnerabilities in multiple dependencies affect IBM MessageGateway/ MessageSight

Source: CCN
Type: IBM Security Bulletin 6592807 (MaaS360)
IBM MaaS360 Cloud Extender Agent, Mobile Enterprise Gateway and VPN module have multiple vulnerabilities (CVE-2021-22060, CVE-2022-22950, CVE-2022-0547, CVE-2022-0778, CVE-2022-22965)

Source: CCN
Type: IBM Security Bulletin 6592963 (DS8880)
Vulnerabilities have been identified in Spring Framework, OpenSSL and Apache HTTP Server shipped with the DS8000 Hardware Management Console (HMC)

Source: CCN
Type: IBM Security Bulletin 6593555 (Spectrum Copy Data Management)
Vulnerabilities in Golang Go, OpenSSL, Python, and XStream affect IBM Spectrum Copy Data Management

Source: CCN
Type: IBM Security Bulletin 6594163 (App Connect Enterprise)
IBM App Connect Enterprise & IBM Integration Bus are vulnerable to a denial of service, due to OpenSSL (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6594527 (Security Identity Manager Virtual Appliance)
A security vulnerability has been fixed in IBM Security Identity Manager Virtual Appliance(CVE-2020-0778)

Source: CCN
Type: IBM Security Bulletin 6596085 (QRadar SIEM)
IBM QRadar WinCollect is vulnerable to using components with known vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6596399 (Spectrum Protect Client)
Denial of Service vulnerability in OpenSSL may affect IBM Spectrum Protect Backup-Archive Client (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6596981 (Spectrum Protect Plus)
Vulnerabilities in Samba, OpenSSL, Python, and XStream affect IBM Spectrum Protect Plus (CVE-2021-20254, CVE-2021-3712, CVE-2021-43859, CVE-2022-0778, CVE-2020-25717, CVE-2021-23192, CVE-2021-3733)

Source: CCN
Type: IBM Security Bulletin 6598053 (Security Guardium)
IBM Security Guardium is affected by multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6598765 (Cloud Transformation Advisor)
IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6601293 (QRadar Network Packet Capture)
IBM QRadar Network Packet Capture includes multiple vulnerable components.

Source: CCN
Type: IBM Security Bulletin 6601945 (QRadar Network Security)
IBM QRadar Network Security is affected by Vulnerability in OpenSSL (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6602289 (Netcool/System Service Monitor)
Multiple vulnerabilities in OpenSSL affect IBM Tivoli Netcool System Service Monitors/Application Service Monitors

Source: CCN
Type: IBM Security Bulletin 6602565 (MQ Appliance)
IBM MQ Appliance affected by an OpenSSL vulnerability (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6602981 (Rational ClearQuest)
Vulnerabilities in OpenSSL affect IBM Rational ClearQuest (CVE-2022-0778, CVE-2022-1292)

Source: CCN
Type: IBM Security Bulletin 6603015 (Event Streams)
Vulnerability in OpenSSL affects IBM Event Streams (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6604005 (Engineering Requirements Quality Assistant)
There are multiple vulnerabilites that affect IBM Engineering Requirements Quality Assistant On-Premises (CVE-2022-0778, CVE-2021-38868, CVE-2021-29799, CVE-2021-29790, CVE-2021-29788)

Source: CCN
Type: IBM Security Bulletin 6604065 (Power Systems)
Vulnerability in OpenSSL (CVE-2022-0778) affects PowerVM

Source: CCN
Type: IBM Security Bulletin 6605801 (Rational ClearCase)
Vulnerability in OpenSSL affects IBM Rational ClearCase (CVE-2022-1292, CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6606987 (Cloud Pak for Security)
IBM Cloud Pak for Security is vulnerable to Using Components with Known Vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6607137 (QRadar SIEM)
OpenSSL as used by IBM QRadar SIEM is vulnerable to denial of service (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6607902 (Security Verify Bridge Docker image)
Denial of service vulnerability in OpenSSL as shipped with IBM Security Verify Bridge Docker image (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6610269 (Sterling Connect:Direct for UNIX)
IBM Sterling Connect:Direct for UNIX Certified Container is affected by denial of service vulnerability in version 1.1.1k-5

Source: CCN
Type: IBM Security Bulletin 6610873 (Cloud Pak for Integration)
Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to denial of service due to OpenSSL CVE-2022-0778

Source: CCN
Type: IBM Security Bulletin 6610901 (Workload Scheduler)
IBM Workload Scheduler is potentially vulnerable to denial of service due to CVE-2022-0778 affecting OpenSSL component

Source: CCN
Type: IBM Security Bulletin 6611967 (Cloud Pak for Automation)
Multiple security vulnerabilities are addressed with IBM Cloud Pak for Business Automation iFixes for July 2022

Source: CCN
Type: IBM Security Bulletin 6612587 (Cloud Pak System Software)
Multiple vulnerabilities in expat, glibc, http server, dojo, openssl shipped with IBM Cloud Pak System

Source: CCN
Type: IBM Security Bulletin 6614235 (Power 9 AC922)
This Power System update is being released to address CVE 2022-0778

Source: CCN
Type: IBM Security Bulletin 6616067 (Virtualization Engine TS7700 3957-VEC)
Due to use of OpenSSL, IBM Virtualization Engine TS7700 is vulnerable to denial of service (CVE-2022-0778) and privilege escalation (CVE-2022-1292)

Source: CCN
Type: IBM Security Bulletin 6616491 (b-type SAN directors and switches)
Vulnerability in Fabric OS firmware used by IBM b-type SAN directors and switches.

Source: CCN
Type: IBM Security Bulletin 6622017 (Spectrum Virtualize)
Vulnerability in OpenSSL affects IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products

Source: CCN
Type: IBM Security Bulletin 6622033 (Cloud Pak for Watson AIOps)
Multiple Vulnerabilities in Cloud Pak for Watson AIOPs

Source: CCN
Type: IBM Security Bulletin 6622079 (Spectrum Protect Plus)
Vulnerabilities in OpenSSL affect IBM Spectrum Protect Plus SQL, File Indexing, and Windows Host agents

Source: CCN
Type: IBM Security Bulletin 6826021 (Robotic Process Automation)
Multiple Security Vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak

Source: CCN
Type: IBM Security Bulletin 6829175 (Watson Speech Services Cartridge for Cloud Pak for Data)
IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to a denial of service in OpenSSL (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6829723 (Sterling Connect:Direct for HP NonStop)
IBM Sterling Connect:Direct for HP NonStop vulnerable to denial of service due to OpenSSL (CVE-2022-0778)

Source: CCN
Type: IBM Security Bulletin 6832966 (FlashSystem V9000)
Vulnerability in OpenSSL affects IBM FlashSystem models V840 and V900

Source: CCN
Type: IBM Security Bulletin 6845419 (PowerVM Hypervisor)
This Power System update is being released to address multiple CVEs for vTPM1.2

Source: CCN
Type: IBM Security Bulletin 6849249 (Security Identity Manager)
Security vulnerabilities have been fixed in IBM Security Verify Governance, Identity Manager virtual appliance component

Source: CCN
Type: IBM Security Bulletin 6854571 (Security Verify Governance)
IBM Security Verify Governance is vulnerable to denial of service due to an OpenSSL vulnerability

Source: CCN
Type: IBM Security Bulletin 6854575 (Security Verify Governance)
IBM Security Verify Governance is vulnerable to denial of service due to OpenSSL as a part of Node.js

Source: CCN
Type: IBM Security Bulletin 6856409 (Cloud Pak for Security)
IBM Cloud Pak for Security includes components with multiple known vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6982841 (Netcool Operations Insight)
Netcool Operations Insight v1.6.8 addresses multiple security vulnerabilities.

Source: CCN
Type: IBM Security Bulletin 6985865 (Safer Payments)
IBM Safer Payments is vulnerable to OpenSSL Denial of Sevice Attack (CVE-2022-0778)

Source: CCN
Type: OpenSSL Security Advisory [15 March 2022]
OpenSSL Security Advisory [15 March 2022]

Source: CONFIRM
Type: Vendor Advisory
https://www.openssl.org/news/secadv/20220315.txt

Source: CCN
Type: Oracle CPUApr2022
Oracle Critical Patch Update Advisory - April 2022

Source: MISC
Type: Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html

Source: CCN
Type: Oracle CPUJul2022
Oracle Critical Patch Update Advisory - July 2022

Source: N/A
Type: Third Party Advisory
N/A

Source: CONFIRM
Type: Third Party Advisory
https://www.tenable.com/security/tns-2022-06

Source: CONFIRM
Type: Third Party Advisory
https://www.tenable.com/security/tns-2022-07

Source: CONFIRM
Type: Third Party Advisory
https://www.tenable.com/security/tns-2022-08

Source: CONFIRM
Type: Third Party Advisory
https://www.tenable.com/security/tns-2022-09

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openssl:openssl:*:*:*:*:*:*:*:* (Version >= 3.0.0 and < 3.0.2)
  • OR cpe:/a:openssl:openssl:*:*:*:*:*:*:*:* (Version >= 1.0.2 and < 1.0.2zd)
  • OR cpe:/a:openssl:openssl:*:*:*:*:*:*:*:* (Version >= 1.1.0 and < 1.1.1n)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:11.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:storagegrid:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:netapp:a250_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:a250:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:netapp:500f_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:500f:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:36:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/a:tenable:nessus:*:*:*:*:*:*:*:* (Version >= 10.0.0 and < 10.1.2)
  • OR cpe:/a:tenable:nessus:*:*:*:*:*:*:*:* (Version < 8.15.4)

  • Configuration 8:
  • cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.3.0 and < 10.3.33)
  • OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.4.0 and < 10.4.23)
  • OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.5.0 and < 10.5.14)
  • OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.7.0 and < 10.7.2)
  • OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.6.0 and < 10.6.6)
  • OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.2.0 and < 10.2.42)

  • Configuration 9:
  • cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 12.0.0 and <= 12.12.0)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version > 17.0.0 and < 17.7.2)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 16.13.0 and < 16.14.2)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 14.15.0 and < 14.19.1)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 12.13.0 and < 12.22.11)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version > 16.0.0 and <= 16.12.0)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version > 14.0.0 and <= 14.14.0)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:rhel_els:6:*:*:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*

  • Configuration RedHat 10:
  • cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:*

  • Configuration RedHat 11:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 12:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openssl:openssl:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:nodejs:node.js:12:*:*:*:*:*:*:*
  • OR cpe:/a:nodejs:node.js:14.0:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:3.0.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:ibm:aix:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_mq:5.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:watson_explorer:11.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:netcool/system_service_monitor:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:watson_explorer:11.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:watson_explorer:11.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_scheduler:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_protect_plus:10.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:18.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_network_security:5.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:18.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:watson_explorer:12.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_connect:express:1.5.0:*:*:*:unix:*:*:*
  • OR cpe:/a:ibm:app_connect:11.0.0.0:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:integration_bus:10.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_network_security:5.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_connect:direct:6.0.0:*:*:*:unix:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:19.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:watson_explorer:12.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:watson_explorer:12.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_network_packet_capture:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:vios:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_transformation_advisor:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:iot_messagesight:5.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:19.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:19.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mq_for_hpe_nonstop:8.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:watson_explorer:12.0.3:*:deep_analytics:*:analytical_components:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:20.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:9.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:9.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_identity_manager_virtual_appliance:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:20.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:20.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:voice_gateway:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_scheduler:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:21.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:21.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:hardware_management_console:9.2.950.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.1.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:19.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:21.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:robotic_process_automation:21.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_automation:19.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_copy_data_management:2.2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:21.0.1:*:*:*:traditional:*:*:*
  • OR cpe:/a:ibm:robotic_process_automation:21.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:robotic_process_automation:21.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise:12.0.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_virtualize:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_copy_data_management:2.2.15.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_protect_client:8.1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_virtualize:7.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.10.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:safer_payments:6.1.0.00:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:safer_payments:6.2.0.00:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:safer_payments:6.3.0.00:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:safer_payments:6.4.0.00:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7631
    P
    libopenssl-3-devel-3.0.8-150500.3.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:8084
    P
    libopenssl-1_0_0-devel-1.0.2p-150000.3.73.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7630
    P
    libopenssl-1_1-devel-1.1.1l-150500.15.4 on GA media (Moderate)
    2023-06-12
    oval:com.redhat.rhsa:def:20225326
    P
    RHSA-2022:5326: compat-openssl10 security update (Low)
    2022-06-30
    oval:org.opensuse.security:def:3045
    P
    cups-pk-helper-0.2.5-5.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3046
    P
    curl-7.60.0-9.8 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3442
    P
    axis-1.4-290.6.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94675
    P
    libopenssl-1_1-devel-1.1.1l-150400.5.14 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:94676
    P
    libopenssl-3-devel-3.0.1-150400.2.4 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:95072
    P
    libopenssl-1_0_0-devel-1.0.2p-3.49.1 on GA media (Moderate)
    2022-06-22
    oval:com.redhat.rhsa:def:20224899
    P
    RHSA-2022:4899: compat-openssl11 security and bug fix update (Important)
    2022-06-03
    oval:org.opensuse.security:def:102278
    P
    Security update for nodejs14 (Important)
    2022-04-28
    oval:org.opensuse.security:def:119383
    P
    Security update for nodejs12 (Important)
    2022-04-28
    oval:org.opensuse.security:def:118886
    P
    Security update for nodejs12 (Important)
    2022-04-28
    oval:org.opensuse.security:def:119568
    P
    Security update for nodejs12 (Important)
    2022-04-28
    oval:org.opensuse.security:def:119193
    P
    Security update for nodejs12 (Important)
    2022-04-28
    oval:org.opensuse.security:def:118696
    P
    Security update for nodejs12 (Important)
    2022-04-28
    oval:org.opensuse.security:def:457
    P
    Security update for nodejs12 (Important)
    2022-04-28
    oval:org.opensuse.security:def:119384
    P
    Security update for nodejs14 (Important)
    2022-04-28
    oval:org.opensuse.security:def:118887
    P
    Security update for nodejs14 (Important)
    2022-04-28
    oval:org.opensuse.security:def:1717
    P
    Security update for nodejs12 (Important)
    2022-04-28
    oval:org.opensuse.security:def:119569
    P
    Security update for nodejs14 (Important)
    2022-04-28
    oval:org.opensuse.security:def:119194
    P
    Security update for nodejs14 (Important)
    2022-04-28
    oval:org.opensuse.security:def:118697
    P
    Security update for nodejs14 (Important)
    2022-04-28
    oval:org.opensuse.security:def:458
    P
    Security update for nodejs14 (Important)
    2022-04-28
    oval:org.opensuse.security:def:1718
    P
    Security update for nodejs14 (Important)
    2022-04-28
    oval:org.opensuse.security:def:102277
    P
    Security update for nodejs12 (Important)
    2022-04-28
    oval:org.opensuse.security:def:42438
    P
    Security update for openssl-1_1 (Important)
    2022-04-13
    oval:com.redhat.rhsa:def:20221065
    P
    RHSA-2022:1065: openssl security update (Important)
    2022-03-28
    oval:com.redhat.rhsa:def:20221066
    P
    RHSA-2022:1066: openssl security update (Important)
    2022-03-28
    oval:com.redhat.rhsa:def:20221073
    P
    RHSA-2022:1073: openssl security update (Important)
    2022-03-28
    oval:org.opensuse.security:def:119713
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:42215
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:101859
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:42358
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:974
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:119039
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:119344
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:118849
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:1197
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:119528
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:101666
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:119152
    P
    Security update for openssl-1_1 (Important)
    2022-03-16
    oval:org.opensuse.security:def:127382
    P
    Security update for openssl-1_1 (Important)
    2022-03-15
    oval:org.opensuse.security:def:5371
    P
    Security update for openssl-1_0_0 (Important)
    2022-03-15
    oval:org.opensuse.security:def:126983
    P
    Security update for openssl-1_0_0 (Important)
    2022-03-15
    oval:org.opensuse.security:def:1244
    P
    Security update for openssl-1_0_0 (Important)
    2022-03-15
    oval:org.opensuse.security:def:125820
    P
    Security update for openssl-1_0_0 (Important)
    2022-03-15
    oval:org.opensuse.security:def:5372
    P
    Security update for openssl-1_1 (Important)
    2022-03-15
    oval:org.opensuse.security:def:126984
    P
    Security update for openssl-1_1 (Important)
    2022-03-15
    oval:org.opensuse.security:def:101897
    P
    Security update for openssl-1_0_0 (Important)
    2022-03-15
    oval:org.opensuse.security:def:125821
    P
    Security update for compat-openssl098 (Important)
    2022-03-15
    oval:org.opensuse.security:def:119527
    P
    Security update for openssl-1_0_0 (Important)
    2022-03-15
    oval:org.opensuse.security:def:6196
    P
    Security update for openssl-1_0_0 (Important)
    2022-03-15
    oval:org.opensuse.security:def:127381
    P
    Security update for openssl-1_0_0 (Important)
    2022-03-15
    oval:org.opensuse.security:def:119712
    P
    Security update for openssl-1_0_0 (Important)
    2022-03-15
    oval:org.opensuse.security:def:4757
    P
    Security update for compat-openssl098 (Important)
    2022-03-15
    oval:org.opensuse.security:def:125822
    P
    Security update for openssl-1_1 (Important)
    2022-03-15
    oval:org.opensuse.security:def:6197
    P
    Security update for openssl-1_1 (Important)
    2022-03-15
    BACK
    openssl openssl *
    openssl openssl *
    openssl openssl *
    debian debian linux 9.0
    debian debian linux 10.0
    debian debian linux 11.0
    netapp santricity smi-s provider -
    netapp storagegrid -
    netapp clustered data ontap -
    netapp clustered data ontap antivirus connector -
    netapp cloud volumes ontap mediator -
    netapp a250 firmware -
    netapp a250 -
    netapp 500f firmware -
    netapp 500f -
    fedoraproject fedora 34
    fedoraproject fedora 36
    tenable nessus *
    tenable nessus *
    mariadb mariadb *
    mariadb mariadb *
    mariadb mariadb *
    mariadb mariadb *
    mariadb mariadb *
    mariadb mariadb *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    openssl openssl 1.1.1
    nodejs node.js 12
    nodejs node.js 14.0
    openssl openssl 1.0.2
    openssl openssl 3.0.0
    ibm aix 7.1
    ibm rational clearcase 8.0.1
    ibm rational clearcase 8.0.0
    ibm i 7.2
    ibm websphere mq 5.3.1
    ibm watson explorer 11.0.0
    ibm netcool/system service monitor 4.0.1
    ibm i 7.3
    ibm watson explorer 11.0.1
    ibm aix 7.2
    ibm watson explorer 11.0.2
    ibm rational clearquest 9.0.1
    ibm workload scheduler 9.4
    ibm business process manager 8.6.0.0
    ibm rational clearcase 9.0.1
    ibm infosphere information server 11.7
    ibm spectrum protect plus 10.1.0
    ibm business automation workflow 18.0.0.0
    ibm qradar security information and event manager 7.3
    ibm qradar network security 5.4.0
    ibm business automation workflow 18.0.0.1
    ibm watson explorer 12.0.0
    ibm sterling connect:express 1.5.0
    ibm app connect 11.0.0.0
    ibm integration bus 10.0.0.0
    ibm qradar network security 5.5.0
    ibm sterling connect:direct 6.0.0
    ibm business automation workflow 19.0.0.1
    ibm watson explorer 12.0.1
    ibm watson explorer 12.0.2
    ibm i 7.4
    ibm qradar network packet capture 7.3
    ibm vios 3.1
    ibm cloud transformation advisor 2.0.1
    ibm iot messagesight 5.0.0.0
    ibm cloud pak for automation 19.0.3
    ibm business automation workflow 19.0.0.3
    ibm business process manager 8.5.0.0
    ibm mq for hpe nonstop 8.1.0
    ibm watson explorer 12.0.3
    ibm security guardium 11.0
    ibm security guardium 11.1
    ibm qradar security information and event manager 7.4 -
    ibm cloud pak for automation 20.0.1
    ibm rational clearquest 9.0.0
    ibm rational clearquest 9.0.2
    ibm security identity manager virtual appliance 7.0.2
    ibm event streams 10.0.0
    ibm cloud pak for automation 20.0.2
    ibm security guardium 11.2
    ibm business automation workflow 20.0.0.1
    ibm event streams 10.1.0
    ibm business automation workflow 20.0.0.2
    ibm cloud pak for automation 20.0.3
    ibm voice gateway 1.0.7
    ibm workload scheduler 9.5
    ibm security guardium 11.3
    ibm event streams 10.2.0
    ibm cloud pak for automation 21.0.1
    ibm app connect enterprise 12.0.1.0
    ibm cloud pak for automation 21.0.2 -
    ibm event streams 10.3.0
    ibm event streams 10.3.1
    ibm hardware management console 9.2.950.0
    ibm security guardium 11.4
    ibm app connect enterprise certified container 1.1.0
    ibm aix 7.3
    ibm cloud pak for automation 19.0.1
    ibm business automation workflow 21.0.3
    ibm qradar security information and event manager 7.5.0 -
    ibm robotic process automation 21.0.0
    ibm cloud pak for automation 19.0.2
    ibm spectrum copy data management 2.2.0.0
    ibm business automation workflow 21.0.1
    ibm robotic process automation 21.0.1
    ibm robotic process automation 21.0.2
    ibm app connect enterprise 12.0.4.0
    ibm spectrum virtualize 8.2
    ibm spectrum copy data management 2.2.15.0
    ibm spectrum protect client 8.1.0.0
    ibm security verify governance 10.0
    ibm spectrum virtualize 7.8
    ibm cloud pak for security 1.10.0.0
    ibm cloud pak for security 1.10.6.0
    ibm safer payments 6.1.0.00
    ibm safer payments 6.2.0.00
    ibm safer payments 6.3.0.00
    ibm safer payments 6.4.0.00