CVE-2022-0778
MySQL vulnerability analysis and mitigation

Overview

The BNmodsqrt() function in OpenSSL versions 1.0.2, 1.1.1 and 3.0 contains a vulnerability (CVE-2022-0778) that can cause it to loop forever for non-prime moduli. The vulnerability was discovered by Tavis Ormandy from Google and disclosed on March 15, 2022. The issue affects certificate parsing containing elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form (OpenSSL Advisory).

Technical details

The vulnerability exists in the BNmodsqrt() function which computes modular square roots. When parsing certificates with invalid explicit curve parameters, it can trigger an infinite loop. Since certificate parsing occurs before signature verification, any process parsing externally supplied certificates is vulnerable to denial of service. The vulnerability also affects parsing of crafted private keys containing explicit elliptic curve parameters. In OpenSSL 1.0.2, while the public key is not parsed during initial certificate parsing, any operation requiring the public key will trigger the infinite loop (OpenSSL Advisory, NVD).

Impact

A successful exploit could lead to denial of service via malformed certificates. Vulnerable scenarios include: TLS clients consuming server certificates, TLS servers consuming client certificates, hosting providers handling customer certificates/private keys, certificate authorities parsing certification requests, and any applications parsing ASN.1 elliptic curve parameters. The vulnerability has a CVSS v3.1 Base Score of 7.5 HIGH (NVD).

Mitigation and workarounds

The vulnerability was fixed in OpenSSL versions 1.1.1n and 3.0.2 released on March 15, 2022. OpenSSL 1.0.2 users should upgrade to version 1.0.2zd (premium support customers only). Users are strongly recommended to upgrade to supported versions as soon as possible (OpenSSL Advisory).

Community reactions

Multiple vendors and organizations issued advisories and patches for their products using affected OpenSSL versions, including Apple, NetApp, Debian, Oracle, and others. The vulnerability received significant attention due to its potential for denial of service attacks against widely-used TLS implementations (Oracle Advisory, NetApp Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management