Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-28389— Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo

EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-28389

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo
Source: NVD (National Vulnerability Database)
Vulnerability Description
Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service. When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing. Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
空指针解引用
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenSSL 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenSSL是OpenSSL团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL存在安全漏洞,该漏洞源于处理特制的使用KeyAgreeRecipientInfo的CMS EnvelopedData消息时可能导致空指针取消引用,可能导致应用程序崩溃和拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenSSLOpenSSL 3.6.0 ~ 3.6.2 -

II. Public POCs for CVE-2026-28389

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-28389

登录查看更多情报信息。

Same Patch Batch · OpenSSL · 2026-04-07 · 7 CVEs total

CVE-2026-31789Heap Buffer Overflow in Hexadecimal Conversion
CVE-2026-31790Incorrect Failure Handling in RSA KEM RSASVE Encapsulation
CVE-2026-28388NULL Pointer Dereference When Processing a Delta CRL
CVE-2026-28387Potential Use-after-free in DANE Client Code
CVE-2026-28386Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support
CVE-2026-28390Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo

IV. Related Vulnerabilities

V. Comments for CVE-2026-28389

No comments yet


Leave a comment