CVE-2026-31789
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
07/04/2026
Last modified:
12/05/2026
Description
Issue summary: Converting an excessively large OCTET STRING value to<br />
a hexadecimal string leads to a heap buffer overflow on 32 bit platforms.<br />
<br />
Impact summary: A heap buffer overflow may lead to a crash or possibly<br />
an attacker controlled code execution or other undefined behavior.<br />
<br />
If an attacker can supply a crafted X.509 certificate with an excessively<br />
large OCTET STRING value in extensions such as the Subject Key Identifier<br />
(SKID) or Authority Key Identifier (AKID) which are being converted to hex,<br />
the size of the buffer needed for the result is calculated as multiplication<br />
of the input length by 3. On 32 bit platforms, this multiplication may overflow<br />
resulting in the allocation of a smaller buffer and a heap buffer overflow.<br />
<br />
Applications and services that print or log contents of untrusted X.509<br />
certificates are vulnerable to this issue. As the certificates would have<br />
to have sizes of over 1 Gigabyte, printing or logging such certificates<br />
is a fairly unlikely operation and only 32 bit platforms are affected,<br />
this issue was assigned Low severity.<br />
<br />
The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this<br />
issue, as the affected code is outside the OpenSSL FIPS module boundary.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.0.20 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.3.0 (including) | 3.3.7 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.4.0 (including) | 3.4.5 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.5.0 (including) | 3.5.6 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.6.0 (including) | 3.6.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/364f095b80601db632b0def6a33316967f863bde
- https://github.com/openssl/openssl/commit/7a9087efd769f362ad9c0e30c7baaa6bbfa65ecf
- https://github.com/openssl/openssl/commit/945b935ac66cc7f1a41f1b849c7c25adb5351f49
- https://github.com/openssl/openssl/commit/a24216018e1ede8ff01a4ff5afff7dfbd443e2f9
- https://github.com/openssl/openssl/commit/a91e537d16d74050dbde50bb0dfb1fe9930f0521
- https://openssl-library.org/news/secadv/20260407.txt
- https://cert-portal.siemens.com/productcert/html/ssa-032379.html



