CVE Vulnerabilities

CVE-2023-0465

Improper Certificate Validation

Published: Mar 28, 2023 | Modified: Feb 18, 2025
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks.

Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether.

Policy processing is disabled by default but can be enabled by passing the -policy argument to the command line utilities or by calling the X509_VERIFY_PARAM_set1_policies() function.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

NameVendorStart VersionEnd Version
OpensslOpenssl1.0.2 (including)1.0.2zh (excluding)
OpensslOpenssl1.1.1 (including)1.1.1u (excluding)
OpensslOpenssl3.0.0 (including)3.0.9 (excluding)
OpensslOpenssl3.1.0 (including)3.1.1 (excluding)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-openssl-1:1.1.1k-16.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-openssl-1:1.1.1k-16.el7jbcs*
Red Hat Enterprise Linux 9RedHatopenssl-1:3.0.7-16.el9_2*
Red Hat Enterprise Linux 9RedHatopenssl-1:3.0.7-16.el9_2*
Red Hat JBoss Web Server 5RedHatopenssl*
Red Hat JBoss Web Server 5.7 on RHEL 7RedHatjws5-tomcat-native-0:1.2.31-16.redhat_16.el7jws*
Red Hat JBoss Web Server 5.7 on RHEL 8RedHatjws5-tomcat-native-0:1.2.31-16.redhat_16.el8jws*
Red Hat JBoss Web Server 5.7 on RHEL 9RedHatjws5-tomcat-native-0:1.2.31-16.redhat_16.el9jws*
Text-Only JBCSRedHatopenssl*
Edk2Ubuntubionic*
Edk2Ubuntuesm-infra/focal*
Edk2Ubuntufocal*
Edk2Ubuntujammy*
Edk2Ubuntukinetic*
Edk2Ubuntulunar*
Edk2Ubuntumantic*
Edk2Ubuntutrusty*
Edk2Ubuntuxenial*
NodejsUbuntuesm-apps/jammy*
NodejsUbuntujammy*
NodejsUbuntutrusty*
OpensslUbuntubionic*
OpensslUbuntudevel*
OpensslUbuntuesm-infra-legacy/trusty*
OpensslUbuntuesm-infra/bionic*
OpensslUbuntuesm-infra/focal*
OpensslUbuntuesm-infra/xenial*
OpensslUbuntufips-preview/jammy*
OpensslUbuntufips-updates/bionic*
OpensslUbuntufips-updates/focal*
OpensslUbuntufips-updates/jammy*
OpensslUbuntufips-updates/xenial*
OpensslUbuntufips/bionic*
OpensslUbuntufips/focal*
OpensslUbuntufips/xenial*
OpensslUbuntufocal*
OpensslUbuntujammy*
OpensslUbuntukinetic*
OpensslUbuntulunar*
OpensslUbuntumantic*
OpensslUbuntunoble*
OpensslUbuntuoracular*
OpensslUbuntuplucky*
OpensslUbuntuquesting*
OpensslUbuntutrusty*
OpensslUbuntutrusty/esm*
OpensslUbuntuupstream*
OpensslUbuntuxenial*
Openssl1.0Ubuntubionic*
Openssl1.0Ubuntuesm-infra/bionic*

Potential Mitigations

References