CVE-2026-32144

Severity CVSS v4.0:
HIGH
Type:
CWE-295 Improper Certificate Validation
Publication date:
07/04/2026
Last modified:
23/04/2026

Description

Improper Certificate Validation vulnerability in Erlang OTP public_key (pubkey_ocsp module) allows OCSP designated-responder authorization bypass via missing signature verification.<br /> <br /> The OCSP response validation in public_key:pkix_ocsp_validate/5 does not verify that a CA-designated responder certificate was cryptographically signed by the issuing CA. Instead, it only checks that the responder certificate&amp;#39;s issuer name matches the CA&amp;#39;s subject name and that the certificate has the OCSPSigning extended key usage. An attacker who can intercept or control OCSP responses can create a self-signed certificate with a matching issuer name and the OCSPSigning EKU, and use it to forge OCSP responses that mark revoked certificates as valid.<br /> <br /> This affects SSL/TLS clients using OCSP stapling, which may accept connections to servers with revoked certificates, potentially transmitting sensitive data to compromised servers. Applications using the public_key:pkix_ocsp_validate/5 API directly are also affected, with impact depending on usage context.<br /> <br /> This vulnerability is associated with program files lib/public_key/src/pubkey_ocsp.erl and program routines pubkey_ocsp:is_authorized_responder/3.<br /> <br /> This issue affects OTP from OTP 27.0 until OTP 28.4.2 and 27.3.4.10 corresponding to public_key from 1.16 until 1.20.3 and 1.17.1.2, and ssl from 11.2 until 11.5.4 and 11.2.12.7.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:* 27.0 (including) 27.3.4.10 (excluding)
cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:* 28.0 (including) 28.4.2 (excluding)
cpe:2.3:a:erlang:erlang\/public_key:*:*:*:*:*:*:*:* 1.16 (including) 1.17.1.2 (excluding)
cpe:2.3:a:erlang:erlang\/public_key:*:*:*:*:*:*:*:* 1.18 (including) 1.20.3 (excluding)
cpe:2.3:a:erlang:erlang\/ssl:*:*:*:*:*:*:*:* 11.2 (including) 11.2.12.7 (excluding)
cpe:2.3:a:erlang:erlang\/ssl:*:*:*:*:*:*:*:* 11.3 (excluding) 11.5.4 (excluding)