
Cloud Vulnerability DB
A community-led vulnerabilities database
The CVE-2023-49083 vulnerability affects the cryptography package, which is designed to expose cryptographic primitives and recipes to Python developers. The vulnerability was discovered in November 2023 and involves a NULL-pointer dereference that occurs when calling load_pem_pkcs7_certificates
or load_der_pkcs7_certificates
functions. The vulnerability affects versions from 3.1 up to (excluding) 41.0.6, and has been patched in version 41.0.6 (GitHub Advisory, NVD).
The vulnerability is classified as a NULL Pointer Dereference (CWE-476) that occurs during the deserialization of PKCS7 certificates. When attempting to load PKCS7 certificates using either the load_pem_pkcs7_certificates
or load_der_pkcs7_certificates
functions, a NULL-pointer dereference can occur, leading to a segmentation fault. The vulnerability has received a CVSS v3.1 base score of 7.5 (HIGH) from NVD with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
The exploitation of this vulnerability can result in a Denial of Service (DoS) condition for any application attempting to deserialize a PKCS7 blob/certificate. The impact primarily affects system availability and stability, as successful exploitation leads to application crashes through segmentation faults (GitHub Advisory).
The vulnerability has been patched in version 41.0.6 of the cryptography package. Users are advised to upgrade to this version or later to mitigate the vulnerability. Various Linux distributions have also released security updates to address this vulnerability, including Fedora which has released version 41.0.7-1.fc39 (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."