Search for vulnerabilities
Vulnerability details: VCID-z5js-c6pd-yybd
Vulnerability ID VCID-z5js-c6pd-yybd
Aliases CVE-2024-9143
Summary Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we're aware of, either only "named curves" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2^m)) curves that can't represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an "exotic" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with "exotic" explicit binary (GF(2^m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Status Published
Exploitability 0.5
Weighted Severity 3.9
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 3.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9143.json
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00416 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.00469 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
epss 0.01681 https://api.first.org/data/v1/epss?cve=CVE-2024-9143
cvssv3.1 7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 4.3 https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712
ssvc Track https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712
cvssv3.1 4.3 https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700
ssvc Track https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700
cvssv3.1 4.3 https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4
ssvc Track https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4
cvssv3.1 4.3 https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154
ssvc Track https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154
cvssv3.1 4.3 https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a
ssvc Track https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a
cvssv3.1 4.3 https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41
ssvc Track https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41
cvssv3.1 4.3 https://openssl-library.org/news/secadv/20241016.txt
ssvc Track https://openssl-library.org/news/secadv/20241016.txt
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9143.json
https://api.first.org/data/v1/epss?cve=CVE-2024-9143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9143
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://security.netapp.com/advisory/ntap-20241101-0001/
http://www.openwall.com/lists/oss-security/2024/10/16/1
http://www.openwall.com/lists/oss-security/2024/10/23/1
http://www.openwall.com/lists/oss-security/2024/10/24/1
1085378 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085378
20241016.txt https://openssl-library.org/news/secadv/20241016.txt
2319236 https://bugzilla.redhat.com/show_bug.cgi?id=2319236
72ae83ad214d2eef262461365a1975707f862712 https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712
8efc0cbaa8ebba8e116f7b81a876a4123594d86a https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a
9d576994cec2b7aa37a91740ea7e680810957e41 https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41
bc7e04d7c8d509fb78fc0e285aa948fb0da04700 https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700
c0d3e4d32d2805f49bec30547f225bc4d092e1f4 https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4
CVE-2024-9143 https://nvd.nist.gov/vuln/detail/CVE-2024-9143
fdf6723362ca51bd883295efe206cb5b1cfa5154 https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154
USN-7264-1 https://usn.ubuntu.com/7264-1/
USN-7278-1 https://usn.ubuntu.com/7278-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9143.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/ Found at https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/ Found at https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/ Found at https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/ Found at https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Found at https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/ Found at https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Found at https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/ Found at https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Found at https://openssl-library.org/news/secadv/20241016.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/ Found at https://openssl-library.org/news/secadv/20241016.txt
Exploit Prediction Scoring System (EPSS)
Percentile 0.11214
EPSS Score 0.00044
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-10-16T21:20:41.571287+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2024/9xxx/CVE-2024-9143.json 34.0.2