First published: Thu Jun 27 2024(Updated: )
<p>We are republishing this OpenSSL CVE to document that the latest version Microsoft Defender for Endpoint has been updated to protect against this OpenSSL library vulnerability.</p>
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssl | <=1.1.1w-0+deb11u1<=1.1.1n-0+deb11u5<=3.0.14-1~deb12u1<=3.0.14-1~deb12u2 | 3.3.2-1 |
Microsoft Azure Linux 3.0 ARM | ||
Microsoft Defender for Endpoint for iOS | ||
Microsoft Azure Linux 3.0 x64 | ||
Microsoft CBL-Mariner | ||
Microsoft CBL-Mariner | ||
Microsoft Defender for Endpoint |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5535 is classified as a moderate severity vulnerability due to its potential impact on applications using OpenSSL.
To fix CVE-2024-5535, update your OpenSSL to version 3.3.2-1 or later if you are using an affected distribution.
CVE-2024-5535 affects various versions of OpenSSL as implemented in products like Microsoft Azure Linux and Defender for Endpoint.
Yes, the latest version of Microsoft Defender for Endpoint has been updated to protect against CVE-2024-5535.
CVE-2024-5535 is related to the OpenSSL API function SSL_select_next_proto when called with an empty supported client list.