openssl openssl CVE-2022-2097 vulnerability in OpenSSL and Other Products
Published on July 5, 2022

AES OCB fails to encrypt some bytes

product logo product logo product logo product logo product logo product logo
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD


Products Associated with CVE-2022-2097

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-2097 are published in these products:

 
 
 
 
 
 
 

Affected Versions

OpenSSL: openssl: openssl: netapp ontap_antivirus_connector: netapp ontap_select_deploy_administration_utility: fedoraproject fedora: netapp active_iq_unified_manager_for_vmware_vsphere: netapp hci_baseboard_management_controller: netapp brocade_fabric_operating_system_firmware: netapp snapcenter: netapp oncommand_insight: netapp smi-s_provider: siemens sinec_ins: debian_linux:

Exploit Probability

EPSS
0.41%
Percentile
60.66%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.