Home / CVE DB / CVE-2024-6119
Standard
Vulnerability Identifier

CVE-2024-6119

2024-09-03
Severity Assessment
7.5
HIGH
CVSS v3.x Score
Clinical Analysis (Description)

Issue summary: Applications performing certificate name checks (e.g., TLS
clients checking server certificates) may attempt to read an invalid memory
address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of
service.

Applications performing certificate name checks (e.g., TLS clients checking
server certificates) may attempt to read an invalid memory address when
comparing the expected name with an `otherName` subject alternative name of an
X.509 certificate. This may result in an exception that terminates the
application program.

Note that basic certificate chain validation (signatures, dates, ...) is not
affected, the denial of service can occur only when the application also
specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they
generally don't perform a name check against a reference identifier (expected
identity), but rather extract the presented identity after checking the
certificate chain. So TLS servers are generally not affected and the severity
of the issue is Moderate.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.

Vector Sequencing

Attack Parameters

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Impact Consequences

Technical Impact

Unchanged
Scope
None
Confidentiality
None
Integrity
High
Availability
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Weakness Classification

CWE-CWE-843

Affected Population

Affected Configurations

Total: 45 detected entries

Software List Scrollable
op
openssl
Vendor: openssl • v3.0.0
op
openssl
Vendor: openssl • v3.0.1
op
openssl
Vendor: openssl • v3.1.6
op
openssl
Vendor: openssl • v3.2.0
ne
bootstrap_os
Vendor: netapp • v-
op
openssl
Vendor: openssl • v3.0.4
ne
h610c_firmware
Vendor: netapp • v-
op
openssl
Vendor: openssl • v3.0.8
ne
ontap_tools
Vendor: netapp • v9
ne
active_iq_unified_manager
Vendor: netapp • v-
ne
ontap_9
Vendor: netapp • v-
op
openssl
Vendor: openssl • v3.0.9
op
openssl
Vendor: openssl • v3.2.1
op
openssl
Vendor: openssl • v3.0.11
ne
h700s_firmware
Vendor: netapp • v-
op
openssl
Vendor: openssl • v3.0.2
op
openssl
Vendor: openssl • v3.0.7
ne
a250_firmware
Vendor: netapp • v-
op
openssl
Vendor: openssl • v3.0.12
op
openssl
Vendor: openssl • v3.1.3
op
openssl
Vendor: openssl • v3.1.2
op
openssl
Vendor: openssl • v3.2.2
ne
h500s_firmware
Vendor: netapp • v-
ne
h410s_firmware
Vendor: netapp • v-
op
openssl
Vendor: openssl • v3.1.0
op
openssl
Vendor: openssl • v3.0.5
op
openssl
Vendor: openssl • v3.0.14
op
openssl
Vendor: openssl • v3.3.1
op
openssl
Vendor: openssl • v3.3.0
ne
h300s_firmware
Vendor: netapp • v-
ne
management_services_for_element_software_and_netapp_hci
Vendor: netapp • v-
ne
h410c_firmware
Vendor: netapp • v-
op
openssl
Vendor: openssl • v3.1.1
ne
c250_firmware
Vendor: netapp • v-
op
openssl
Vendor: openssl • v3.1.5
ne
h610s_firmware
Vendor: netapp • v-
ne
500f_firmware
Vendor: netapp • v-
op
openssl
Vendor: openssl • v3.0.13
op
openssl
Vendor: openssl • v3.0.6
op
openssl
Vendor: openssl • v3.0.3
ne
brocade_fabric_operating_system
Vendor: netapp • v-
ne
ontap_select_deploy_administration_utility
Vendor: netapp • v-
ne
h615c
Vendor: netapp • v-
op
openssl
Vendor: openssl • v3.0.10
op
openssl
Vendor: openssl • v3.1.4
Timeline

Time Line

PUBLICATION
03 Sep 2024
MODIFICATION
03 Jun 2025
FIRST PATCH
17 Oct 2025
Impact Statistics

Key Metrics

CVSS Score
7.5
HIGH
Products
45
Affected
Patches
7
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.