CVE-2024-12797
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/02/2025
Last modified:
18/02/2025
Description
Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a<br />
server may fail to notice that the server was not authenticated, because<br />
handshakes don&#39;t abort as expected when the SSL_VERIFY_PEER verification mode<br />
is set.<br />
<br />
Impact summary: TLS and DTLS connections using raw public keys may be<br />
vulnerable to man-in-middle attacks when server authentication failure is not<br />
detected by clients.<br />
<br />
RPKs are disabled by default in both TLS clients and TLS servers. The issue<br />
only arises when TLS clients explicitly enable RPK use by the server, and the<br />
server, likewise, enables sending of an RPK instead of an X.509 certificate<br />
chain. The affected clients are those that then rely on the handshake to<br />
fail when the server&#39;s RPK fails to match one of the expected public keys,<br />
by setting the verification mode to SSL_VERIFY_PEER.<br />
<br />
Clients that enable server-side raw public keys can still find out that raw<br />
public key verification failed by calling SSL_get_verify_result(), and those<br />
that do, and take appropriate action, are not affected. This issue was<br />
introduced in the initial implementation of RPK support in OpenSSL 3.2.<br />
<br />
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Impact
Base Score 3.x
6.30
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/738d4f9fdeaad57660dcba50a619fafced3fd5e9
- https://github.com/openssl/openssl/commit/798779d43494549b611233f92652f0da5328fbe7
- https://github.com/openssl/openssl/commit/87ebd203feffcf92ad5889df92f90bb0ee10a699
- https://openssl-library.org/news/secadv/20250211.txt
- http://www.openwall.com/lists/oss-security/2025/02/11/3
- http://www.openwall.com/lists/oss-security/2025/02/11/4
- https://security.netapp.com/advisory/ntap-20250214-0001/