CVE-2022-1473: Denial of Service in OpenSSL OpenSSL
The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service. Also traversing the empty hash table entries will take increasingly more time. Typically such long lived processes might be TLS clients or TLS servers configured to accept client certificate authentication. The function was added in the OpenSSL 3.0 version thus older releases are not affected by the issue. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
AI Analysis
Technical Summary
CVE-2022-1473 is a high-severity denial of service (DoS) vulnerability in OpenSSL versions 3.0.0, 3.0.1, and 3.0.2, fixed in version 3.0.3. The issue resides in the OPENSSL_LH_flush() function, which is responsible for emptying a hash table used internally by OpenSSL when decoding certificates or keys. Due to a bug, the function fails to properly reuse memory occupied by removed hash table entries. This causes memory usage to grow unboundedly in long-lived processes that periodically decode certificates or keys, such as TLS clients or servers configured for client certificate authentication. Over time, this memory leak can cause the process to consume excessive memory, potentially leading to termination by the operating system and resulting in a denial of service. Additionally, traversing the increasingly large empty hash table entries degrades performance further. Since this function was introduced in OpenSSL 3.0, older versions are unaffected. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires no privileges or user interaction and can be triggered remotely by sending crafted certificates or keys to the vulnerable process. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability. No known exploits are currently reported in the wild. This vulnerability is classified under CWE-459 (Incomplete Cleanup).
Potential Impact
European organizations running services that utilize OpenSSL 3.0.x versions (specifically 3.0.0 to 3.0.2) and that perform frequent certificate or key decoding in long-lived processes are at risk. This includes TLS servers configured for client certificate authentication and TLS clients that regularly decode certificates. The memory leak can cause service degradation and eventual crashes, leading to denial of service conditions. Critical infrastructure, financial institutions, healthcare providers, and government agencies relying on OpenSSL 3.0 for secure communications could face service interruptions, impacting business continuity and trust. The denial of service could be exploited remotely without authentication, increasing risk. Given the widespread use of OpenSSL in European IT environments, the impact could be significant if unpatched. However, the lack of known exploits and the requirement for specific usage patterns somewhat limit immediate widespread exploitation. Still, organizations with high availability requirements must prioritize remediation to avoid potential outages.
Mitigation Recommendations
Organizations should immediately audit their environments to identify any systems running OpenSSL versions 3.0.0, 3.0.1, or 3.0.2. Upgrading to OpenSSL 3.0.3 or later is the primary and most effective mitigation. For systems where immediate upgrade is not feasible, consider the following: limit or avoid configurations that require frequent certificate or key decoding in long-lived processes, especially client certificate authentication on TLS servers; implement resource monitoring and alerting for abnormal memory usage in relevant processes; employ process restart or recycling strategies to mitigate memory exhaustion; isolate vulnerable services behind load balancers or failover mechanisms to maintain availability; and apply strict network controls to limit exposure of vulnerable services. Additionally, review application code that interacts with OpenSSL to minimize unnecessary certificate/key decoding operations. Regularly monitor vendor advisories for any updates or patches related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2022-1473: Denial of Service in OpenSSL OpenSSL
Description
The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service. Also traversing the empty hash table entries will take increasingly more time. Typically such long lived processes might be TLS clients or TLS servers configured to accept client certificate authentication. The function was added in the OpenSSL 3.0 version thus older releases are not affected by the issue. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
AI-Powered Analysis
Technical Analysis
CVE-2022-1473 is a high-severity denial of service (DoS) vulnerability in OpenSSL versions 3.0.0, 3.0.1, and 3.0.2, fixed in version 3.0.3. The issue resides in the OPENSSL_LH_flush() function, which is responsible for emptying a hash table used internally by OpenSSL when decoding certificates or keys. Due to a bug, the function fails to properly reuse memory occupied by removed hash table entries. This causes memory usage to grow unboundedly in long-lived processes that periodically decode certificates or keys, such as TLS clients or servers configured for client certificate authentication. Over time, this memory leak can cause the process to consume excessive memory, potentially leading to termination by the operating system and resulting in a denial of service. Additionally, traversing the increasingly large empty hash table entries degrades performance further. Since this function was introduced in OpenSSL 3.0, older versions are unaffected. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires no privileges or user interaction and can be triggered remotely by sending crafted certificates or keys to the vulnerable process. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability. No known exploits are currently reported in the wild. This vulnerability is classified under CWE-459 (Incomplete Cleanup).
Potential Impact
European organizations running services that utilize OpenSSL 3.0.x versions (specifically 3.0.0 to 3.0.2) and that perform frequent certificate or key decoding in long-lived processes are at risk. This includes TLS servers configured for client certificate authentication and TLS clients that regularly decode certificates. The memory leak can cause service degradation and eventual crashes, leading to denial of service conditions. Critical infrastructure, financial institutions, healthcare providers, and government agencies relying on OpenSSL 3.0 for secure communications could face service interruptions, impacting business continuity and trust. The denial of service could be exploited remotely without authentication, increasing risk. Given the widespread use of OpenSSL in European IT environments, the impact could be significant if unpatched. However, the lack of known exploits and the requirement for specific usage patterns somewhat limit immediate widespread exploitation. Still, organizations with high availability requirements must prioritize remediation to avoid potential outages.
Mitigation Recommendations
Organizations should immediately audit their environments to identify any systems running OpenSSL versions 3.0.0, 3.0.1, or 3.0.2. Upgrading to OpenSSL 3.0.3 or later is the primary and most effective mitigation. For systems where immediate upgrade is not feasible, consider the following: limit or avoid configurations that require frequent certificate or key decoding in long-lived processes, especially client certificate authentication on TLS servers; implement resource monitoring and alerting for abnormal memory usage in relevant processes; employ process restart or recycling strategies to mitigate memory exhaustion; isolate vulnerable services behind load balancers or failover mechanisms to maintain availability; and apply strict network controls to limit exposure of vulnerable services. Additionally, review application code that interacts with OpenSSL to minimize unnecessary certificate/key decoding operations. Regularly monitor vendor advisories for any updates or patches related to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- openssl
- Date Reserved
- 2022-04-26T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbcae
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/3/2025, 10:55:44 AM
Last updated: 2/4/2026, 4:14:27 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22549: CWE-250: Execution with Unnecessary Privileges in F5 F5 BIG-IP Container Ingress Services
MediumCVE-2025-70545: n/a
HighCVE-2026-0873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ercom Cryptobox
MediumCVE-2026-22548: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in F5 BIG-IP
MediumCVE-2026-20732: CWE-451: User Interface (UI) Misrepresentation of Critical Information in F5 BIG-IP
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.