Home / CVE DB / CVE-2024-0727
Standard
Vulnerability Identifier

CVE-2024-0727

2024-01-26
Severity Assessment
5.5
MEDIUM
CVSS v3.x Score
Clinical Analysis (Description)

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL
to crash leading to a potential Denial of Service attack

Impact summary: Applications loading files in the PKCS12 format from untrusted
sources might terminate abruptly.

A file in PKCS12 format can contain certificates and keys and may come from an
untrusted source. The PKCS12 specification allows certain fields to be NULL, but
OpenSSL does not correctly check for this case. This can lead to a NULL pointer
dereference that results in OpenSSL crashing. If an application processes PKCS12
files from an untrusted source using the OpenSSL APIs then that application will
be vulnerable to this issue.

OpenSSL APIs that are vulnerable to this are: PKCS12_parse(),
PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
and PKCS12_newpass().

We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
function is related to writing data we do not consider it security significant.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.

Vector Sequencing

Attack Parameters

Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Impact Consequences

Technical Impact

Unchanged
Scope
None
Confidentiality
None
Integrity
High
Availability
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Weakness Classification

CWE-CWE-476

Affected Population

Affected Configurations

Total: 21 detected entries

Software List Scrollable
op
openssl
Vendor: openssl • v3.0.0
op
openssl
Vendor: openssl • v3.0.1
op
openssl
Vendor: openssl • v3.2.0
op
openssl
Vendor: openssl • v3.0.4
op
openssl
Vendor: openssl • v3.0.8
op
openssl
Vendor: openssl • v3.0.9
op
openssl
Vendor: openssl • v1.0.2
op
openssl
Vendor: openssl • v3.0.11
op
openssl
Vendor: openssl • v3.0.2
op
openssl
Vendor: openssl • v1.1.1
op
openssl
Vendor: openssl • v3.0.7
op
openssl
Vendor: openssl • v3.0.12
op
openssl
Vendor: openssl • v3.1.3
op
openssl
Vendor: openssl • v3.1.2
op
openssl
Vendor: openssl • v3.1.0
op
openssl
Vendor: openssl • v3.0.5
op
openssl
Vendor: openssl • v3.1.1
op
openssl
Vendor: openssl • v3.0.6
op
openssl
Vendor: openssl • v3.0.3
op
openssl
Vendor: openssl • v3.0.10
op
openssl
Vendor: openssl • v3.1.4
Timeline

Time Line

PUBLICATION
26 Jan 2024
MODIFICATION
03 Nov 2025
FIRST PATCH
28 Nov 2025
Impact Statistics

Key Metrics

CVSS Score
5.5
MEDIUM
Products
21
Affected
Patches
5
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.