2 vulnerabilities classified as CWE-599 (缺失对OpenSSL证书的验证). AI Chinese analysis included.
CWE-599 represents a critical validation weakness where applications utilizing OpenSSL fail to rigorously verify digital certificates before establishing secure connections. This oversight typically occurs when developers rely on default trust behaviors or neglect to invoke the SSL_get_verify_result() function, thereby bypassing essential checks for certificate validity, expiration, and chain integrity. Attackers exploit this vulnerability by performing man-in-the-middle attacks, intercepting traffic through forged or self-signed certificates that the application erroneously accepts as legitimate. To mitigate this risk, developers must explicitly implement comprehensive certificate validation logic, ensuring that every connection attempt is scrutinized against a trusted root store. By strictly enforcing verification routines and rejecting any certificate that fails to meet security requirements, organizations can prevent unauthorized access and safeguard data integrity against sophisticated interception attempts.
if (cert = SSL_get_peer_certificate(ssl)) { // got certificate, host can be trusted //foo=SSL_get_verify_result(ssl); //if (X509_V_OK==foo) ... }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-25060 | OpenList Insecure TLS Default Configuration — OpenList | 8.1 | High | 2026-02-02 |
| CVE-2025-12553 | Server Certificate Verification Disabled — BLU-IC2 | 7.5 | - | 2025-10-31 |
Vulnerabilities classified as CWE-599 (缺失对OpenSSL证书的验证) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.