Search for vulnerabilities
Vulnerability details: VCID-ec3y-aejm-aaad
Vulnerability ID VCID-ec3y-aejm-aaad
Aliases CVE-2022-4450
GHSA-v5w6-wcm8-jm4q
Summary The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4450.json
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00174 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
epss 0.00187 https://api.first.org/data/v1/epss?cve=CVE-2022-4450
cvssv3.1 5.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-v5w6-wcm8-jm4q
cvssv3.1 7.5 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83
generic_textual HIGH https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83
ssvc Track https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83
cvssv3.1 7.5 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b
generic_textual HIGH https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b
ssvc Track https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-4450
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-4450
cvssv3.1 7.5 https://rustsec.org/advisories/RUSTSEC-2023-0010.html
generic_textual HIGH https://rustsec.org/advisories/RUSTSEC-2023-0010.html
cvssv3.1 7.5 https://security.gentoo.org/glsa/202402-08
ssvc Track https://security.gentoo.org/glsa/202402-08
cvssv3.1 7.4 https://www.openssl.org/news/secadv/20230207.txt
cvssv3.1 7.5 https://www.openssl.org/news/secadv/20230207.txt
generic_textual HIGH https://www.openssl.org/news/secadv/20230207.txt
ssvc Track https://www.openssl.org/news/secadv/20230207.txt
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4450.json
https://api.first.org/data/v1/epss?cve=CVE-2022-4450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b
https://rustsec.org/advisories/RUSTSEC-2023-0010.html
https://www.openssl.org/news/secadv/20230207.txt
2164494 https://bugzilla.redhat.com/show_bug.cgi?id=2164494
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
CVE-2022-4450 https://nvd.nist.gov/vuln/detail/CVE-2022-4450
GHSA-v5w6-wcm8-jm4q https://github.com/advisories/GHSA-v5w6-wcm8-jm4q
GLSA-202402-08 https://security.gentoo.org/glsa/202402-08
RHSA-2023:0946 https://access.redhat.com/errata/RHSA-2023:0946
RHSA-2023:1199 https://access.redhat.com/errata/RHSA-2023:1199
RHSA-2023:1405 https://access.redhat.com/errata/RHSA-2023:1405
RHSA-2023:2165 https://access.redhat.com/errata/RHSA-2023:2165
RHSA-2023:2932 https://access.redhat.com/errata/RHSA-2023:2932
RHSA-2023:3354 https://access.redhat.com/errata/RHSA-2023:3354
RHSA-2023:3355 https://access.redhat.com/errata/RHSA-2023:3355
RHSA-2023:3408 https://access.redhat.com/errata/RHSA-2023:3408
RHSA-2023:3420 https://access.redhat.com/errata/RHSA-2023:3420
RHSA-2023:3421 https://access.redhat.com/errata/RHSA-2023:3421
USN-5844-1 https://usn.ubuntu.com/5844-1/
USN-6564-1 https://usn.ubuntu.com/6564-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4450.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:38Z/ Found at https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:38Z/ Found at https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-4450
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-4450
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://rustsec.org/advisories/RUSTSEC-2023-0010.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.gentoo.org/glsa/202402-08
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:38Z/ Found at https://security.gentoo.org/glsa/202402-08
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H Found at https://www.openssl.org/news/secadv/20230207.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.openssl.org/news/secadv/20230207.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:38Z/ Found at https://www.openssl.org/news/secadv/20230207.txt
Exploit Prediction Scoring System (EPSS)
Percentile 0.27315
EPSS Score 0.00116
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.