| Vulnerability Name: | CVE-2023-0466 (CCN-251307) | ||||||||||||||||||||
| Assigned: | 2023-03-28 | ||||||||||||||||||||
| Published: | 2023-03-28 | ||||||||||||||||||||
| Updated: | 2023-06-08 | ||||||||||||||||||||
| Summary: | OpenSSL could allow a remote attacker to bypass security restrictions, caused by a flaw in the X509_VERIFY_PARAM_add0_policy function. By using invalid certificate policies, an attacker could exploit this vulnerability to bypass certificate verification. | ||||||||||||||||||||
| CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
3.2 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||
| CVSS v2 Severity: | 2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2023-0466 Source: XF Type: UNKNOWN openssl-cve20230466-sec-bypass(251307) Source: openssl-security@openssl.org Type: Mailing List, Patch openssl-security@openssl.org Source: openssl-security@openssl.org Type: Mailing List, Patch openssl-security@openssl.org Source: openssl-security@openssl.org Type: Mailing List, Patch openssl-security@openssl.org Source: openssl-security@openssl.org Type: UNKNOWN openssl-security@openssl.org Source: openssl-security@openssl.org Type: UNKNOWN openssl-security@openssl.org Source: openssl-security@openssl.org Type: UNKNOWN openssl-security@openssl.org Source: CCN Type: OpenSSL Security Advisory [28th March 2023] OpenSSL Security Advisory [28th March 2023] Source: openssl-security@openssl.org Type: Vendor Advisory openssl-security@openssl.org | ||||||||||||||||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
| BACK | |||||||||||||||||||||