CVE-2026-28387
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
07/04/2026
Last modified:
12/05/2026
Description
Issue summary: An uncommon configuration of clients performing DANE TLSA-based<br />
server authentication, when paired with uncommon server DANE TLSA records, may<br />
result in a use-after-free and/or double-free on the client side.<br />
<br />
Impact summary: A use after free can have a range of potential consequences<br />
such as the corruption of valid data, crashes or execution of arbitrary code.<br />
<br />
However, the issue only affects clients that make use of TLSA records with both<br />
the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate<br />
usage.<br />
<br />
By far the most common deployment of DANE is in SMTP MTAs for which RFC7672<br />
recommends that clients treat as &#39;unusable&#39; any TLSA records that have the PKIX<br />
certificate usages. These SMTP (or other similar) clients are not vulnerable<br />
to this issue. Conversely, any clients that support only the PKIX usages, and<br />
ignore the DANE-TA(2) usage are also not vulnerable.<br />
<br />
The client would also need to be communicating with a server that publishes a<br />
TLSA RRset with both types of TLSA records.<br />
<br />
No FIPS modules are affected by this issue, the problem code is outside the<br />
FIPS module boundary.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 1.1.1 (including) | 1.1.1zg (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.0.20 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.3.0 (including) | 3.3.7 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.4.0 (including) | 3.4.5 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.5.0 (including) | 3.5.6 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.6.0 (including) | 3.6.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/07e727d304746edb49a98ee8f6ab00256e1f012b
- https://github.com/openssl/openssl/commit/258a8f63b26995ba357f4326da00e19e29c6acbe
- https://github.com/openssl/openssl/commit/444958deaf450aea819171f97ae69eaedede42c3
- https://github.com/openssl/openssl/commit/7a4e08cee62a728d32e60b0de89e6764339df0a7
- https://github.com/openssl/openssl/commit/ec03fa050b3346997ed9c5fef3d0e16ad7db8177
- https://openssl-library.org/news/secadv/20260407.txt
- https://cert-portal.siemens.com/productcert/html/ssa-032379.html
- https://cert-portal.siemens.com/productcert/html/ssa-265688.html



