CVE-2022-1292: Command injection in OpenSSL OpenSSL
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
AI Analysis
Technical Summary
CVE-2022-1292 is a critical command injection vulnerability found in the c_rehash script distributed with OpenSSL versions 3.0.0 through 3.0.2, 1.1.1 through 1.1.1n, and 1.0.2 through 1.0.2zd. The root cause is improper sanitization of shell metacharacters within the c_rehash script, which can lead to arbitrary command execution. The c_rehash script is used to create symbolic links to certificate files to facilitate certificate verification processes. However, on some operating systems, this script is automatically executed, and due to the lack of proper input sanitization, an attacker can inject malicious shell commands that will be executed with the privileges of the script. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The issue has been addressed by replacing the c_rehash script with the OpenSSL rehash command line tool and by fixing the sanitization issues in OpenSSL versions 3.0.3, 1.1.1o, and 1.0.2ze. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability’s high impact on confidentiality, integrity, and availability, as well as its ease of exploitation without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the potential for severe damage is significant due to the widespread use of OpenSSL in numerous applications and operating systems.
Potential Impact
For European organizations, the impact of CVE-2022-1292 can be substantial. OpenSSL is a foundational cryptographic library used extensively across servers, network devices, embedded systems, and software applications. Exploitation of this vulnerability could allow attackers to execute arbitrary commands remotely, potentially leading to full system compromise. This could result in unauthorized data access, data manipulation, service disruption, and lateral movement within networks. Critical infrastructure, financial institutions, healthcare providers, and government agencies in Europe that rely on OpenSSL for secure communications and certificate management are particularly at risk. The automatic execution of the vulnerable script on some operating systems increases the attack surface, especially in environments where legacy or unpatched OpenSSL versions remain in use. The confidentiality of sensitive data, integrity of systems, and availability of services could all be severely affected, leading to regulatory compliance issues under GDPR and other data protection laws.
Mitigation Recommendations
European organizations should immediately verify their OpenSSL versions and upgrade to patched releases: 3.0.3 or later, 1.1.1o or later, or 1.0.2ze or later. They should discontinue the use of the obsolete c_rehash script and replace it with the OpenSSL rehash command line tool. System administrators must audit automated processes and scripts that invoke c_rehash to ensure they are not vulnerable to injection attacks. Additionally, organizations should implement strict input validation and sanitization for any scripts or tools that handle certificate files or shell commands. Employing application whitelisting and restricting script execution privileges can reduce the risk of exploitation. Monitoring logs for unusual command execution patterns and deploying endpoint detection and response (EDR) solutions can help detect and respond to potential exploitation attempts. Finally, organizations should maintain an up-to-date inventory of systems using OpenSSL and prioritize patching those exposed to external networks or critical business functions.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Switzerland
CVE-2022-1292: Command injection in OpenSSL OpenSSL
Description
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
AI-Powered Analysis
Technical Analysis
CVE-2022-1292 is a critical command injection vulnerability found in the c_rehash script distributed with OpenSSL versions 3.0.0 through 3.0.2, 1.1.1 through 1.1.1n, and 1.0.2 through 1.0.2zd. The root cause is improper sanitization of shell metacharacters within the c_rehash script, which can lead to arbitrary command execution. The c_rehash script is used to create symbolic links to certificate files to facilitate certificate verification processes. However, on some operating systems, this script is automatically executed, and due to the lack of proper input sanitization, an attacker can inject malicious shell commands that will be executed with the privileges of the script. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The issue has been addressed by replacing the c_rehash script with the OpenSSL rehash command line tool and by fixing the sanitization issues in OpenSSL versions 3.0.3, 1.1.1o, and 1.0.2ze. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability’s high impact on confidentiality, integrity, and availability, as well as its ease of exploitation without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the potential for severe damage is significant due to the widespread use of OpenSSL in numerous applications and operating systems.
Potential Impact
For European organizations, the impact of CVE-2022-1292 can be substantial. OpenSSL is a foundational cryptographic library used extensively across servers, network devices, embedded systems, and software applications. Exploitation of this vulnerability could allow attackers to execute arbitrary commands remotely, potentially leading to full system compromise. This could result in unauthorized data access, data manipulation, service disruption, and lateral movement within networks. Critical infrastructure, financial institutions, healthcare providers, and government agencies in Europe that rely on OpenSSL for secure communications and certificate management are particularly at risk. The automatic execution of the vulnerable script on some operating systems increases the attack surface, especially in environments where legacy or unpatched OpenSSL versions remain in use. The confidentiality of sensitive data, integrity of systems, and availability of services could all be severely affected, leading to regulatory compliance issues under GDPR and other data protection laws.
Mitigation Recommendations
European organizations should immediately verify their OpenSSL versions and upgrade to patched releases: 3.0.3 or later, 1.1.1o or later, or 1.0.2ze or later. They should discontinue the use of the obsolete c_rehash script and replace it with the OpenSSL rehash command line tool. System administrators must audit automated processes and scripts that invoke c_rehash to ensure they are not vulnerable to injection attacks. Additionally, organizations should implement strict input validation and sanitization for any scripts or tools that handle certificate files or shell commands. Employing application whitelisting and restricting script execution privileges can reduce the risk of exploitation. Monitoring logs for unusual command execution patterns and deploying endpoint detection and response (EDR) solutions can help detect and respond to potential exploitation attempts. Finally, organizations should maintain an up-to-date inventory of systems using OpenSSL and prioritize patching those exposed to external networks or critical business functions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- openssl
- Date Reserved
- 2022-04-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbc80
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/3/2025, 10:55:23 AM
Last updated: 8/9/2025, 3:17:28 AM
Views: 16
Related Threats
CVE-2025-7679: CWE-306 Missing Authentication for Critical Function in ABB Aspect
HighCVE-2025-7677: CWE-306 Missing Authentication for Critical Function in ABB Aspect
MediumCVE-2025-53191: CWE-306 Missing Authentication for Critical Function in ABB Aspect
HighCVE-2025-53190: CWE-286 in ABB Aspect
HighCVE-2025-53189: CWE-639 Authorization Bypass Through User-Controlled Key in ABB Aspect
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.