First published: Thu Mar 25 2021(Updated: )
On March 25, 2021, the OpenSSL Project released a security advisory, OpenSSL Security Advisory [25 March 2021], that disclosed two vulnerabilities. Exploitation of these vulnerabilities could allow an attacker to use a valid non-certificate authority (CA) certificate to act as a CA and sign a certificate for an arbitrary organization, user or device, or to cause a denial of service (DoS) condition. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
Credit: These vulnerabilities were publicly disclosed by the OpenSSL Software Foundation on March 25 2021.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | ||
Cisco Products |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-openssl-2021-GHY28dJd is classified as high due to potential exploitation that can lead to unauthorized acts as a certificate authority.
To fix cisco-sa-openssl-2021-GHY28dJd, update affected OpenSSL and Cisco products to their patched versions as recommended in the advisory.
The products affected by cisco-sa-openssl-2021-GHY28dJd include various Cisco products that utilize OpenSSL for cryptographic functions.
Exploitation of cisco-sa-openssl-2021-GHY28dJd can allow attackers to impersonate a trusted entity, leading to man-in-the-middle attacks or data breaches.
There is no recommended workaround for cisco-sa-openssl-2021-GHY28dJd; the best course of action is to apply the available security updates.