{"id":"CVE-2026-28389","summary":"Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo","details":"Issue summary: During processing of a crafted CMS EnvelopedData message\nwith KeyAgreeRecipientInfo a NULL pointer dereference can happen.\n\nImpact summary: Applications that process attacker-controlled CMS data may\ncrash before authentication or cryptographic operations occur resulting in\nDenial of Service.\n\nWhen a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is\nprocessed, the optional parameters field of KeyEncryptionAlgorithmIdentifier\nis examined without checking for its presence. This results in a NULL\npointer dereference if the field is missing.\n\nApplications and services that call CMS_decrypt() on untrusted input\n(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the affected code is outside the OpenSSL FIPS module boundary.","modified":"2026-05-18T21:44:12.918897359Z","published":"2026-04-07T22:00:53.364Z","related":["CGA-vc7c-6mhm-829j","SUSE-SU-2026:1213-1","SUSE-SU-2026:1214-1","SUSE-SU-2026:1215-1","SUSE-SU-2026:1216-1","SUSE-SU-2026:1255-1","SUSE-SU-2026:1256-1","SUSE-SU-2026:1257-1","SUSE-SU-2026:1290-1","SUSE-SU-2026:1291-1","SUSE-SU-2026:1375-1","SUSE-SU-2026:1386-1","SUSE-SU-2026:1577-1","SUSE-SU-2026:21037-1","SUSE-SU-2026:21065-1","SUSE-SU-2026:21107-1","SUSE-SU-2026:21186-1","openSUSE-SU-2026:10533-1","openSUSE-SU-2026:20525-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/28xxx/CVE-2026-28389.json","cna_assigner":"openssl","cwe_ids":["CWE-476"]},"references":[{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/28xxx/CVE-2026-28389.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28389"},{"type":"ADVISORY","url":"https://openssl-library.org/news/secadv/20260407.txt"},{"type":"FIX","url":"https://github.com/openssl/openssl/commit/16cea4188e0ea567deb4f93f85902247e67384f5"},{"type":"FIX","url":"https://github.com/openssl/openssl/commit/785cbf7ea3b5a6f5adf0c1ccb92b79d89c35c616"},{"type":"FIX","url":"https://github.com/openssl/openssl/commit/7b5274e812400cacb6f3be4c2df5340923fa807f"},{"type":"FIX","url":"https://github.com/openssl/openssl/commit/c6725634e089eb2b634b10ede33944be7248172a"},{"type":"FIX","url":"https://github.com/openssl/openssl/commit/f80f83bc5fd036bc47d773e8b15a001e2b4ce686"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"fixed":"e818b74be2170fbe957a07b0da4401c2b694b3b8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-28389.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}