DNA View

High Severity Vulnerability

This vulnerability has been rated as High severity. Immediate action is recommended.

CVE-2024-6119

High
Low Medium High Critical
7.5
CVSS Score
Published: Sep 03, 2024
Last Modified: Jun 03, 2025

Vulnerability Description

Issue summary: Applications performing certificate name checks (e.g., TLS
clients checking server certificates) may attempt to read an invalid memory
address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of
service.

Applications performing certificate name checks (e.g., TLS clients checking
server certificates) may attempt to read an invalid memory address when
comparing the expected name with an `otherName` subject alternative name of an
X.509 certificate. This may result in an exception that terminates the
application program.

Note that basic certificate chain validation (signatures, dates, ...) is not
affected, the denial of service can occur only when the application also
specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they
generally don't perform a name check against a reference identifier (expected
identity), but rather extract the presented identity after checking the
certificate chain. So TLS servers are generally not affected and the severity
of the issue is Moderate.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
N
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
N
Integrity
N
Availability
H

Known Affected Software

45 configuration(s) from 2 vendor(s)

bootstrap_os
Version:
-
CPE:
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
h610c_firmware
Version:
-
CPE:
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
ontap_tools
Version:
9
CPE:
cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*
active_iq_unified_manager
Version:
-
CPE:
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
ontap_9
Version:
-
CPE:
cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*
h700s_firmware
Version:
-
CPE:
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
a250_firmware
Version:
-
CPE:
cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
h500s_firmware
Version:
-
CPE:
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
h410s_firmware
Version:
-
CPE:
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
h300s_firmware
Version:
-
CPE:
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
management_services_for_element_software_and_netapp_hci
Version:
-
CPE:
cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*
h410c_firmware
Version:
-
CPE:
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
c250_firmware
Version:
-
CPE:
cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
h610s_firmware
Version:
-
CPE:
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
500f_firmware
Version:
-
CPE:
cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
brocade_fabric_operating_system
Version:
-
CPE:
cpe:2.3:o:netapp:brocade_fabric_operating_system:-:*:*:*:*:*:*:*
ontap_select_deploy_administration_utility
Version:
-
CPE:
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
h615c
Version:
-
CPE:
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*
openssl
Version:
3.0.0
CPE:
cpe:2.3:a:openssl:openssl:3.0.0:beta2:*:*:*:*:*:*
openssl
Version:
3.0.1
CPE:
cpe:2.3:a:openssl:openssl:3.0.1:*:*:*:*:*:*:*
openssl
Version:
3.1.6
CPE:
cpe:2.3:a:openssl:openssl:3.1.6:*:*:*:*:*:*:*
openssl
Version:
3.2.0
CPE:
cpe:2.3:a:openssl:openssl:3.2.0:alpha2:*:*:*:*:*:*
openssl
Version:
3.0.4
CPE:
cpe:2.3:a:openssl:openssl:3.0.4:*:*:*:*:*:*:*
openssl
Version:
3.0.8
CPE:
cpe:2.3:a:openssl:openssl:3.0.8:*:*:*:*:*:*:*
openssl
Version:
3.0.9
CPE:
cpe:2.3:a:openssl:openssl:3.0.9:*:*:*:*:*:*:*
openssl
Version:
3.2.1
CPE:
cpe:2.3:a:openssl:openssl:3.2.1:*:*:*:*:*:*:*
openssl
Version:
3.0.11
CPE:
cpe:2.3:a:openssl:openssl:3.0.11:*:*:*:*:*:*:*
openssl
Version:
3.0.2
CPE:
cpe:2.3:a:openssl:openssl:3.0.2:*:*:*:*:*:*:*
openssl
Version:
3.0.7
CPE:
cpe:2.3:a:openssl:openssl:3.0.7:*:*:*:*:*:*:*
openssl
Version:
3.0.12
CPE:
cpe:2.3:a:openssl:openssl:3.0.12:*:*:*:*:*:*:*
openssl
Version:
3.1.3
CPE:
cpe:2.3:a:openssl:openssl:3.1.3:*:*:*:*:*:*:*
openssl
Version:
3.1.2
CPE:
cpe:2.3:a:openssl:openssl:3.1.2:*:*:*:*:*:*:*
openssl
Version:
3.2.2
CPE:
cpe:2.3:a:openssl:openssl:3.2.2:*:*:*:*:*:*:*
openssl
Version:
3.1.0
CPE:
cpe:2.3:a:openssl:openssl:3.1.0:-:*:*:*:*:*:*
openssl
Version:
3.0.5
CPE:
cpe:2.3:a:openssl:openssl:3.0.5:*:*:*:*:*:*:*
openssl
Version:
3.0.14
CPE:
cpe:2.3:a:openssl:openssl:3.0.14:*:*:*:*:*:*:*
openssl
Version:
3.3.1
CPE:
cpe:2.3:a:openssl:openssl:3.3.1:*:*:*:*:*:*:*
openssl
Version:
3.3.0
CPE:
cpe:2.3:a:openssl:openssl:3.3.0:*:*:*:*:*:*:*
openssl
Version:
3.1.1
CPE:
cpe:2.3:a:openssl:openssl:3.1.1:-:*:*:*:*:*:*
openssl
Version:
3.1.5
CPE:
cpe:2.3:a:openssl:openssl:3.1.5:*:*:*:*:*:*:*
openssl
Version:
3.0.13
CPE:
cpe:2.3:a:openssl:openssl:3.0.13:*:*:*:*:*:*:*
openssl
Version:
3.0.6
CPE:
cpe:2.3:a:openssl:openssl:3.0.6:*:*:*:*:*:*:*
openssl
Version:
3.0.3
CPE:
cpe:2.3:a:openssl:openssl:3.0.3:*:*:*:*:*:*:*
openssl
Version:
3.0.10
CPE:
cpe:2.3:a:openssl:openssl:3.0.10:*:*:*:*:*:*:*
openssl
Version:
3.1.4
CPE:
cpe:2.3:a:openssl:openssl:3.1.4:*:*:*:*:*:*:*
This vulnerability affects 45 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

7 patches available from vendors

View All Patches
Microsoft

2024-Dec-CVE-2024-6119

CVE-2024-6119: None

Severity
Unknown
Released
Oct 17, 2025
Security Update
Microsoft

2024-Sep-CVE-2024-6119

CVE-2024-6119: Possible denial of service in X.509 name checks

Severity
Unknown
Released
Oct 11, 2025
Security Update
Microsoft

2024-Oct-CVE-2024-6119

CVE-2024-6119: None

Severity
Unknown
Released
Oct 01, 2025
Security Update
Microsoft

2025-Jun-CVE-2024-6119

CVE-2024-6119: None

Severity
Unknown
Released
Sep 04, 2025
Security Update
Microsoft

2024-Nov-CVE-2024-6119

CVE-2024-6119: None

Severity
Unknown
Released
Sep 04, 2025
Security Update
Oracle

CPUAPR2025

Oracle Critical Patch Update Advisory - April 2025

Severity
Critical
Released
Apr 15, 2025
Restart Required
Security Update
Oracle

CPUJAN2025

Oracle Critical Patch Update Advisory - January 2025

Severity
Critical
Released
Jan 21, 2025
Restart Required
Security Update

Severity Details

7.5
out of 10.0
High

Weakness Type (CWE)

CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')

Description
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Typical Severity
High
Abstraction Level
Base

Key Information

Published Date
September 03, 2024