CVE-2026-28389
Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Issue summary: During processing of a crafted CMS EnvelopedData message
with KeyAgreeRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may
crash before authentication or cryptographic operations occur resulting in
Denial of Service. When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is
processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier
is examined without checking for its presence. This results in a NULL
pointer dereference if the field is missing. Applications and services that call CMS_decrypt() on untrusted input
(e.g., S/MIME processing or CMS-based protocols) are vulnerable. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
issue, as the affected code is outside the OpenSSL FIPS module boundary.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2026-02-27 CVE Reserved
- 2026-04-07 CVE Published
- 2026-05-12 CVE Updated
- 2026-05-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (6)
| URL | Tag | Source |
|---|
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|---|---|
| https://openssl-library.org/news/secadv/20260407.txt | 2026-04-10 |
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| OpenSSL Search vendor "OpenSSL" | OpenSSL Search vendor "OpenSSL" for product "OpenSSL" | >= 3.6.0 < 3.6.2 Search vendor "OpenSSL" for product "OpenSSL" and version " >= 3.6.0 < 3.6.2" | en |
Affected
| ||||||
| OpenSSL Search vendor "OpenSSL" | OpenSSL Search vendor "OpenSSL" for product "OpenSSL" | >= 3.5.0 < 3.5.6 Search vendor "OpenSSL" for product "OpenSSL" and version " >= 3.5.0 < 3.5.6" | en |
Affected
| ||||||
| OpenSSL Search vendor "OpenSSL" | OpenSSL Search vendor "OpenSSL" for product "OpenSSL" | >= 3.4.0 < 3.4.5 Search vendor "OpenSSL" for product "OpenSSL" and version " >= 3.4.0 < 3.4.5" | en |
Affected
| ||||||
| OpenSSL Search vendor "OpenSSL" | OpenSSL Search vendor "OpenSSL" for product "OpenSSL" | >= 3.3.0 < 3.3.7 Search vendor "OpenSSL" for product "OpenSSL" and version " >= 3.3.0 < 3.3.7" | en |
Affected
| ||||||
| OpenSSL Search vendor "OpenSSL" | OpenSSL Search vendor "OpenSSL" for product "OpenSSL" | >= 3.0.0 < 3.0.20 Search vendor "OpenSSL" for product "OpenSSL" and version " >= 3.0.0 < 3.0.20" | en |
Affected
| ||||||
