Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-28386— Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support

EPSS 0.05% · P16
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-28386

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support
Source: NVD (National Vulnerability Database)
Vulnerability Description
Issue summary: Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support can trigger an out-of-bounds read of up to 15 bytes when processing partial cipher blocks. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application if the input buffer ends at a memory page boundary and the following page is unmapped. There is no information disclosure as the over-read bytes are not written to output. The vulnerable code path is only reached when processing partial blocks (when a previous call left an incomplete block and the current call provides fewer bytes than needed to complete it). Additionally, the input buffer must be positioned at a page boundary with the following page unmapped. CFB mode is not used in TLS/DTLS protocols, which use CBC, GCM, CCM, or ChaCha20-Poly1305 instead. For these reasons the issue was assessed as Low severity according to our Security Policy. Only x86-64 systems with AVX-512 and VAES instruction support are affected. Other architectures and systems without VAES support use different code paths that are not affected. OpenSSL FIPS module in 3.6 version is affected by this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨界内存读
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenSSL 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenSSL是OpenSSL团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL 3.6版本存在安全漏洞,该漏洞源于处理部分密文块时可能触发越界读取,可能导致应用程序崩溃和拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenSSLOpenSSL 3.6.0 ~ 3.6.2 -

II. Public POCs for CVE-2026-28386

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-28386

Please Login to view more intelligence information

Same Patch Batch · OpenSSL · 2026-04-07 · 7 CVEs total

CVE-2026-31789Heap Buffer Overflow in Hexadecimal Conversion
CVE-2026-31790Incorrect Failure Handling in RSA KEM RSASVE Encapsulation
CVE-2026-28388NULL Pointer Dereference When Processing a Delta CRL
CVE-2026-28387Potential Use-after-free in DANE Client Code
CVE-2026-28390Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo
CVE-2026-28389Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo

IV. Related Vulnerabilities

V. Comments for CVE-2026-28386

No comments yet


Leave a comment