Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2748 articles · 110074 vulns · 36/41 feeds (7d)
← Back to list
7.5
CVE-2026-28389PATCHED
openssl · openssl

Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo

Description

Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service. When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing. Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.

Affected Products

VendorProductVersions
opensslopenssl3.6.0, 3.5.0, 3.4.0, 3.3.0, 3.0.0, 1.1.1, 1.0.2

References

  • https://openssl-library.org/news/secadv/20260407.txt(vendor-advisory)
  • https://github.com/openssl/openssl/commit/f80f83bc5fd036bc47d773e8b15a001e2b4ce686(patch)
  • https://github.com/openssl/openssl/commit/16cea4188e0ea567deb4f93f85902247e67384f5(patch)
  • https://github.com/openssl/openssl/commit/785cbf7ea3b5a6f5adf0c1ccb92b79d89c35c616(patch)
  • https://github.com/openssl/openssl/commit/c6725634e089eb2b634b10ede33944be7248172a(patch)
  • https://github.com/openssl/openssl/commit/7b5274e812400cacb6f3be4c2df5340923fa807f(patch)

Related News (2 articles)

Tier A
Microsoft MSRC1d ago
CVE-2026-28389 Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo
→ No new info (linked only)
Tier B
CERT-FR4d ago
Multiples vulnérabilités dans OpenSSL (08 avril 2026)
→ No new info (linked only)
CVSS 3.17.5 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
3.6.23.5.63.4.53.3.73.0.201.1.1zg1.0.2zp
CWECWE-476
PublishedApr 7, 2026
Trending Score43
Source articles2
Independent2
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

MEDIUMCVE-2026-31790EXP
Incorrect Failure Handling in RSA KEM RSASVE Encapsulation
Trending: 84
HIGHCVE-2026-28390
Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo
Trending: 46
HIGHCVE-2026-28388
NULL Pointer Dereference When Processing a Delta CRL
Trending: 35
CRITICALCVE-2026-28386
Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support
Trending: 33
NONECVE-2026-31789
Heap Buffer Overflow in Hexadecimal Conversion
Trending: 26

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 7, 2026
Discovered by ZDM
Apr 7, 2026
Patch Available
Apr 10, 2026