CWE
295
Advisory Published
Updated

CVE-2022-1343

First published: Tue May 03 2022(Updated: )

The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).

Credit: openssl-security@openssl.org openssl-security@openssl.org

Affected SoftwareAffected VersionHow to fix
redhat/openssl<1:3.0.1-41.el9_0
1:3.0.1-41.el9_0
OpenSSL OpenSSL>=3.0.0<3.0.3
Netapp Active Iq Unified Manager
NetApp Clustered Data ONTAP
Netapp Clustered Data Ontap Antivirus Connector
Netapp Santricity Smi-s Provider
Netapp Smi-s Provider
Netapp Snapmanager
Netapp Solidfire\, Enterprise Sds \& Hci Storage Node
Netapp Solidfire \& Hci Management Node
Netapp A250 Firmware
Netapp A250
Netapp A700s Firmware
Netapp A700s
Netapp Aff 500f Firmware
Netapp Aff 500f
Netapp Aff 8300 Firmware
Netapp Aff 8300
Netapp Aff 8700 Firmware
Netapp Aff 8700
Netapp Aff A400 Firmware
Netapp Aff A400
Netapp Fabric-attached Storage A400 Firmware
Netapp Fabric-attached Storage A400
Netapp Fas 500f Firmware
Netapp Fas 500f
Netapp Fas 8300 Firmware
Netapp Fas 8300
Netapp Fas 8700 Firmware
Netapp Fas 8700
Netapp H300e Firmware
Netapp H300e
Apple macOS Ventura
Apple macOS Big Sur
Apple macOS Monterey
Apple macOS Monterey
Netapp H500e Firmware
Netapp H500e
Apple macOS Big Sur
Apple macOS Ventura
Netapp H700e Firmware
Netapp H700e
Apple macOS Big Sur
Apple macOS Monterey
ubuntu/openssl<3.0.2-0ubuntu1.1
3.0.2-0ubuntu1.1
ubuntu/openssl<3.0.2-0ubuntu2
3.0.2-0ubuntu2
ubuntu/openssl<3.0.2-0ubuntu2
3.0.2-0ubuntu2
ubuntu/openssl<3.0.3
3.0.3
ubuntu/openssl<3.0.2-0ubuntu2
3.0.2-0ubuntu2
All of
Netapp A250 Firmware
Netapp A250
All of
Netapp A700s Firmware
Netapp A700s
All of
Netapp Aff 500f Firmware
Netapp Aff 500f
All of
Netapp Aff 8300 Firmware
Netapp Aff 8300
All of
Netapp Aff 8700 Firmware
Netapp Aff 8700
All of
Netapp Aff A400 Firmware
Netapp Aff A400
All of
Netapp Fabric-attached Storage A400 Firmware
Netapp Fabric-attached Storage A400
All of
Netapp Fas 500f Firmware
Netapp Fas 500f
All of
Netapp Fas 8300 Firmware
Netapp Fas 8300
All of
Netapp Fas 8700 Firmware
Netapp Fas 8700
All of
Netapp H300e Firmware
Netapp H300e
All of
Apple macOS Ventura
Apple macOS Big Sur
All of
Apple macOS Monterey
Apple macOS Monterey
All of
Netapp H500e Firmware
Netapp H500e
All of
Apple macOS Big Sur
Apple macOS Ventura
All of
Netapp H700e Firmware
Netapp H700e
All of
Apple macOS Big Sur
Apple macOS Monterey
redhat/openssl<3.0.3
3.0.3
debian/openssl
1.1.1n-0+deb10u3
1.1.1n-0+deb10u6
1.1.1w-0+deb11u1
1.1.1n-0+deb11u5
3.0.11-1~deb12u2
3.1.4-2
3.1.5-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the vulnerability ID of this flaw?

    The vulnerability ID of this flaw is CVE-2022-1343.

  • What is the severity level of CVE-2022-1343?

    CVE-2022-1343 has a severity level of medium.

  • How does the flaw in OpenSSL's OCSP response functionality impact the verification of signer certificates?

    The flaw allows a successful verification even when the response signing certificate fails to verify, if the OCSP_NOCHECKS flag is used.

  • Which versions of OpenSSL are affected by CVE-2022-1343?

    OpenSSL versions up to and excluding 3.0.3 are affected by this vulnerability.

  • Where can I find more information about CVE-2022-1343?

    You can find more information about CVE-2022-1343 in the references provided: [link1], [link2], [link3]

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203