OpenSSL clients using RPKs: OpenSSL TLS/DTLS RFC7250 Raw Public Key Handler flaw (CVE-2024-12797) #shorts
Summary
Today, we're diving into a recently published high-severity vulnerability within OpenSSL, identified as CVE-2024-12797. This flaw can enable man-in-the-middle attacks when certain conditions are met, and affects a range of OpenSSL versions below 3.4.1, specifically those leveraging RFC7250 Raw Public Keys.
Product details
OpenSSL is a robust, full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It's commonly employed across a wide array of applications to ensure secure communications. Versions up to 3.2.3, 3.3.2, and 3.4.0 are affected by this particular vulnerability.
Vulnerability type summary
This vulnerability pertains to a missing report of error condition, categorized as CWE-392. It specifically affects the way OpenSSL handles RFC7250 Raw Public Keys during server-client verification processes.
Details of the vulnerability
In affected OpenSSL versions, when TLS or DTLS connections utilize raw public keys, there exists a risk of man-in-the-middle attacks. This occurs if the client fails to verify the server correctly due to the handshake not aborting as expected when an RPK mismatch occurs under SSL_VERIFY_PEER verification mode. Typically, clients rely on the handshake process to fail when the server’s RPK doesn't match any expected public keys. However, this vulnerability can permit the connection to proceed unnoticed, making the client susceptible to potential attacks.
Conclusion
It is crucial for users of OpenSSL versions 3.4.0, 3.3.0, and 3.2.0 to update immediately to the latest patched versions to avoid potential security compromises. Staying informed and proactive in applying security updates provides the best defense against vulnerabilities like CVE-2024-12797. For those using these OpenSSL versions in combination with RFC7250 RPKs, this update is especially critical.
Watch the full video on YouTube: CVE-2024-12797
Remediation and exploitation details
This chain involves the following actors
This following systems are involved
Attack entry point
Remediation actions
Exploitation actions
Related Content
NOTE: The following related content has not been vetted and may be unsafe.
- https://openssl-library.org/news/secadv/20250211.txt
- https://github.com/openssl/openssl/commit/738d4f9fdeaad57660dcba50a619fafced3fd5e9
- https://github.com/openssl/openssl/commit/87ebd203feffcf92ad5889df92f90bb0ee10a699
- https://github.com/openssl/openssl/commit/798779d43494549b611233f92652f0da5328fbe7