Skip to main content

CVE-2022-43705: n/a in n/a

Critical
VulnerabilityCVE-2022-43705cvecve-2022-43705n-acwe-295
Published: Sun Nov 27 2022 (11/27/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

In Botan before 2.19.3, it is possible to forge OCSP responses due to a certificate verification error. This issue was introduced in Botan 1.11.34 (November 2016).

AI-Powered Analysis

AILast updated: 06/22/2025, 05:34:48 UTC

Technical Analysis

CVE-2022-43705 is a critical vulnerability affecting the Botan cryptographic library versions prior to 2.19.3. Botan is a widely used open-source C++ cryptography library employed in various security-sensitive applications and systems globally. The vulnerability arises from a certificate verification error introduced in Botan version 1.11.34 (released November 2016), which allows an attacker to forge Online Certificate Status Protocol (OCSP) responses. OCSP is a protocol used to obtain the revocation status of X.509 digital certificates, crucial for validating the trustworthiness of certificates in TLS/SSL communications and other cryptographic operations. The flaw corresponds to CWE-295, indicating improper certificate validation. Exploiting this vulnerability, an attacker can craft fraudulent OCSP responses that appear legitimate, potentially causing clients to accept revoked or invalid certificates as valid. This undermines the integrity of certificate revocation checks, leading to a high impact on confidentiality and availability. The CVSS v3.1 base score is 9.1 (critical), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H, indicating network exploitable, low attack complexity, no privileges or user interaction required, unchanged scope, high confidentiality impact, no integrity impact, and high availability impact. No known exploits in the wild have been reported yet, but the severity and ease of exploitation make it a significant threat. The absence of vendor/project/product specifics suggests the vulnerability affects any software or systems integrating vulnerable Botan versions. The lack of patch links implies users must upgrade to Botan 2.19.3 or later to remediate the issue.

Potential Impact

For European organizations, the ability to forge OCSP responses can severely compromise secure communications and trust infrastructures. Systems relying on Botan for certificate validation, including VPNs, secure web servers, email encryption, and other cryptographic services, may accept revoked or malicious certificates, enabling man-in-the-middle (MITM) attacks, data interception, or denial of service. This can lead to unauthorized data disclosure, disruption of critical services, and erosion of trust in digital identities. Sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to their reliance on strong cryptographic assurances. The vulnerability's network-exploitable nature means attackers can remotely target affected systems without authentication or user interaction, increasing the threat surface. Given the long introduction period (since 2016), many legacy systems may still be vulnerable, amplifying the risk. The impact on availability arises from potential denial of service scenarios if systems reject legitimate certificates or are forced to operate with compromised trust decisions.

Mitigation Recommendations

1. Immediate upgrade to Botan version 2.19.3 or later to ensure the certificate verification flaw is patched. 2. Conduct an inventory of all software and systems using Botan to identify vulnerable versions, including embedded devices and third-party applications. 3. Implement network-level monitoring for anomalous OCSP traffic patterns that could indicate forged responses. 4. Where possible, employ OCSP stapling with strict validation policies to reduce reliance on external OCSP responders. 5. Use certificate pinning or additional certificate validation mechanisms to detect forged or revoked certificates. 6. Engage with software vendors and suppliers to confirm Botan version usage and patch status. 7. For critical systems, consider temporary compensating controls such as disabling OCSP checks if feasible and safe, or increasing logging and alerting on certificate validation failures. 8. Educate security teams about the vulnerability to recognize potential exploitation signs and respond promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-24T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbefea2

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/22/2025, 5:34:48 AM

Last updated: 8/17/2025, 4:15:29 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats