Search for vulnerabilities
Vulnerability details: VCID-uwma-72dv-aaan
Vulnerability ID VCID-uwma-72dv-aaan
Aliases CVE-2024-27355
GHSA-jr22-8qgm-4q87
Summary An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. When processing the ASN.1 object identifier of a certificate, a sub identifier may be provided that leads to a denial of service (CPU consumption for decodeOID).
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.002 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00227 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00227 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00227 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.003 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.003 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.003 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
epss 0.00581 https://api.first.org/data/v1/epss?cve=CVE-2024-27355
cvssv3.1 7.5 https://gist.github.com/katzj/ee72f3c2a00590812b2ea3c0c8890e0b
generic_textual HIGH https://gist.github.com/katzj/ee72f3c2a00590812b2ea3c0c8890e0b
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-jr22-8qgm-4q87
cvssv3.1 7.5 https://github.com/FriendsOfPHP/security-advisories/blob/master/phpseclib/phpseclib/CVE-2024-27355.yaml
generic_textual HIGH https://github.com/FriendsOfPHP/security-advisories/blob/master/phpseclib/phpseclib/CVE-2024-27355.yaml
cvssv3.1 7.5 https://github.com/phpseclib/phpseclib
generic_textual HIGH https://github.com/phpseclib/phpseclib
cvssv3.1 7.5 https://github.com/phpseclib/phpseclib/blob/978d081fe50ff92879c50ff143c62a143edb0117/phpseclib/File/ASN1.php#L1129
generic_textual HIGH https://github.com/phpseclib/phpseclib/blob/978d081fe50ff92879c50ff143c62a143edb0117/phpseclib/File/ASN1.php#L1129
cvssv3.1 7.5 https://github.com/phpseclib/phpseclib/commit/e32531001b4d62c66c3d824ccef54ffad835eb59
generic_textual HIGH https://github.com/phpseclib/phpseclib/commit/e32531001b4d62c66c3d824ccef54ffad835eb59
cvssv3.1 7.5 https://lists.debian.org/debian-lts-announce/2024/03/msg00002.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2024/03/msg00002.html
cvssv3.1 7.5 https://lists.debian.org/debian-lts-announce/2024/03/msg00003.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2024/03/msg00003.html
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://gist.github.com/katzj/ee72f3c2a00590812b2ea3c0c8890e0b
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/FriendsOfPHP/security-advisories/blob/master/phpseclib/phpseclib/CVE-2024-27355.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/phpseclib/phpseclib
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/phpseclib/phpseclib/blob/978d081fe50ff92879c50ff143c62a143edb0117/phpseclib/File/ASN1.php#L1129
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/phpseclib/phpseclib/commit/e32531001b4d62c66c3d824ccef54ffad835eb59
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.debian.org/debian-lts-announce/2024/03/msg00002.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.debian.org/debian-lts-announce/2024/03/msg00003.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.16666
EPSS Score 0.00045
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-04-23T17:19:10.119092+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2024-27355 34.0.0rc4