Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.153999
Category:General
Title:OpenSSL RPKs Vulnerability (20250211) - Linux
Summary:OpenSSL is prone to a vulnerability in the RFC7250 Raw Public; Keys (RPKs) handshake.
Description:Summary:
OpenSSL is prone to a vulnerability in the RFC7250 Raw Public
Keys (RPKs) handshake.

Vulnerability Insight:
Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a
server may fail to notice that the server was not authenticated, because handshakes don't abort
as expected when the SSL_VERIFY_PEER verification mode is set.

Vulnerability Impact:
TLS and DTLS connections using raw public keys may be vulnerable
to man-in-middle attacks when server authentication failure is not detected by clients.

RPKs are disabled by default in both TLS clients and TLS servers. The issue only arises when TLS
clients explicitly enable RPK use by the server, and the server, likewise, enables sending of an
RPK instead of an X.509 certificate chain. The affected clients are those that then rely on the
handshake to fail when the server's RPK fails to match one of the expected public keys, by
setting the verification mode to SSL_VERIFY_PEER.

Clients that enable server-side raw public keys can still find out that raw public key
verification failed by calling SSL_get_verify_result(), and those that do, and take appropriate
action, are not affected.

Affected Software/OS:
OpenSSL versions 3.2, 3.3 and 3.4.

Solution:
Update to version 3.2.4, 3.3.3, 3.4.1 or later.

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2024-12797
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.