Skip to main content

CVE-2023-0217: invalid pointer dereference in OpenSSL OpenSSL

High
VulnerabilityCVE-2023-0217cvecve-2023-0217
Published: Wed Feb 08 2023 (02/08/2023, 19:02:48 UTC)
Source: CVE
Vendor/Project: OpenSSL
Product: OpenSSL

Description

An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack. The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3.

AI-Powered Analysis

AILast updated: 07/03/2025, 12:11:39 UTC

Technical Analysis

CVE-2023-0217 is a high-severity vulnerability in OpenSSL version 3.0.0 involving an invalid pointer dereference during the processing of malformed DSA public keys. Specifically, the vulnerability arises in the EVP_PKEY_public_check() function, which is designed to validate public keys. When this function attempts to check a malformed DSA public key, it dereferences an invalid pointer on read, causing the application to crash. This behavior can be exploited by an attacker who supplies crafted malformed public keys to trigger a denial of service (DoS) condition. Notably, the core TLS implementation in OpenSSL does not invoke EVP_PKEY_public_check(), so typical TLS operations are not directly affected. However, applications that explicitly call this function—often to meet additional security requirements such as those mandated by standards like FIPS 140-3—are vulnerable. The vulnerability is classified under CWE-476 (NULL Pointer Dereference), which typically leads to application crashes and service interruptions. The CVSS v3.1 base score is 7.5 (high), reflecting the vulnerability's network attack vector, low attack complexity, no privileges or user interaction required, and its impact limited to availability (denial of service). There are no known exploits in the wild at the time of publication, and no official patches have been linked yet, indicating that mitigation may require updates from OpenSSL or application-level workarounds.

Potential Impact

For European organizations, the primary impact of CVE-2023-0217 is the potential for denial of service attacks against applications using OpenSSL 3.0.0 that explicitly invoke EVP_PKEY_public_check() for DSA public key validation. Such applications may be found in environments with stringent cryptographic validation requirements, including government agencies, financial institutions, and critical infrastructure operators adhering to FIPS 140-3 or similar standards. A successful attack could disrupt services by crashing applications, leading to downtime and potential operational disruption. While confidentiality and integrity are not directly impacted, availability degradation can affect business continuity and trust. Organizations relying on OpenSSL 3.0.0 in custom or specialized cryptographic workflows are at higher risk. The absence of known exploits reduces immediate threat likelihood but does not eliminate risk, especially as attackers may develop exploits over time. The vulnerability's network exposure and lack of required authentication increase the risk profile, particularly for externally facing services or APIs that process untrusted public keys.

Mitigation Recommendations

European organizations should take the following specific steps: 1) Identify and inventory all applications using OpenSSL 3.0.0, focusing on those that call EVP_PKEY_public_check() or perform explicit DSA public key validation. 2) Temporarily disable or avoid invoking EVP_PKEY_public_check() where possible, especially on untrusted inputs, until a patched OpenSSL version is available. 3) Implement input validation and sanitization to reject malformed DSA public keys before they reach the vulnerable function. 4) Monitor application logs and crash reports for signs of exploitation attempts or abnormal terminations related to public key processing. 5) Engage with OpenSSL maintainers and track official security advisories for patches or updates addressing this vulnerability. 6) For environments requiring FIPS 140-3 compliance, review cryptographic policy configurations to balance security requirements with exposure to this vulnerability. 7) Employ network-level protections such as rate limiting and filtering to reduce the risk of automated or mass exploitation attempts. 8) Prepare incident response plans to quickly address potential denial of service incidents linked to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
openssl
Date Reserved
2023-01-11T12:02:46.441Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc41b

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:11:39 PM

Last updated: 7/31/2025, 5:53:12 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats