CVE-2026-28390
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
07/04/2026
Last modified:
10/04/2026
Description
Issue summary: During processing of a crafted CMS EnvelopedData message<br />
with KeyTransportRecipientInfo a NULL pointer dereference can happen.<br />
<br />
Impact summary: Applications that process attacker-controlled CMS data may<br />
crash before authentication or cryptographic operations occur resulting in<br />
Denial of Service.<br />
<br />
When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with<br />
RSA-OAEP encryption is processed, the optional parameters field of<br />
RSA-OAEP SourceFunc algorithm identifier is examined without checking<br />
for its presence. This results in a NULL pointer dereference if the field<br />
is missing.<br />
<br />
Applications and services that call CMS_decrypt() on untrusted input<br />
(e.g., S/MIME processing or CMS-based protocols) are vulnerable.<br />
<br />
The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this<br />
issue, as the affected code is outside the OpenSSL FIPS module boundary.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc
- https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6
- https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4
- https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788
- https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75
- https://openssl-library.org/news/secadv/20260407.txt



