Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27448: CWE-636: Not Failing Securely ('Failing Open') in pyca pyopenssl

0
Low
VulnerabilityCVE-2026-27448cvecve-2026-27448cwe-636
Published: Tue Mar 17 2026 (03/17/2026, 23:24:30 UTC)
Source: CVE Database V5
Vendor/Project: pyca
Product: pyopenssl

Description

CVE-2026-27448 is a vulnerability in pyOpenSSL versions from 0. 14. 0 up to but not including 26. 0. 0, where unhandled exceptions in user-provided callbacks to set_tlsext_servername_callback cause the connection to be accepted rather than rejected. This behavior constitutes a failure to fail securely ('failing open'), potentially allowing attackers to bypass security-sensitive logic implemented in these callbacks. The issue was fixed in version 26. 0. 0 by changing the behavior to reject connections on such exceptions. The vulnerability has a low CVSS score of 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 00:58:57 UTC

Technical Analysis

pyOpenSSL is a widely used Python wrapper around the OpenSSL cryptographic library, enabling TLS/SSL functionality in Python applications. The vulnerability CVE-2026-27448 arises from improper error handling in the set_tlsext_servername_callback function, which allows users to define a callback to process the TLS Server Name Indication (SNI) extension during the TLS handshake. In affected versions (>=0.14.0 and <26.0.0), if the user-defined callback raises an unhandled exception, the library incorrectly accepts the TLS connection instead of rejecting it. This behavior is classified under CWE-636 (Not Failing Securely), meaning the system fails open rather than closed, potentially bypassing security controls implemented in the callback. For example, if the callback enforces access control or certificate validation based on the SNI, an exception could allow unauthorized connections. The issue was addressed in pyOpenSSL 26.0.0 by modifying the error handling logic to reject connections when exceptions occur in the callback, thus enforcing a fail-closed security posture. The CVSS 4.0 vector indicates network attack vector, high attack complexity, partial impact on integrity, and no user interaction or privileges required, resulting in a low overall score of 1.7. No public exploits or active exploitation have been reported, suggesting limited exposure so far.

Potential Impact

The primary impact of this vulnerability is the potential bypass of security-sensitive logic implemented in the set_tlsext_servername_callback, which could include hostname-based access controls, custom certificate validation, or other TLS handshake policies. An attacker could exploit this by triggering an exception in the callback, causing the connection to be accepted even if it should have been rejected. This could lead to unauthorized access or man-in-the-middle scenarios in applications relying on pyOpenSSL for TLS termination or inspection. However, the impact is limited by the requirement that the application uses this specific callback for security decisions and that the attacker can induce the exception. Since the vulnerability does not allow arbitrary code execution or direct compromise of confidentiality or availability, the overall risk is low. Organizations using pyOpenSSL in critical infrastructure or security-sensitive contexts should be aware of this risk, especially if they implement custom SNI handling. The lack of known exploits and the low CVSS score indicate a relatively low immediate threat, but the vulnerability could be leveraged in targeted attacks against vulnerable deployments.

Mitigation Recommendations

The most effective mitigation is to upgrade pyOpenSSL to version 26.0.0 or later, where the issue is fixed by rejecting connections on unhandled exceptions in the callback. For organizations unable to upgrade immediately, a temporary mitigation is to ensure that user-defined callbacks for set_tlsext_servername_callback are robustly coded to handle all exceptions internally and never propagate them. This includes comprehensive try-except blocks around all callback logic to prevent unhandled exceptions. Additionally, thorough testing and code reviews should be conducted to verify callback stability. Monitoring TLS handshake logs for unexpected exceptions or anomalies may help detect exploitation attempts. Organizations should also evaluate whether they rely on this callback for security decisions and consider alternative approaches if possible. Finally, applying defense-in-depth controls such as network segmentation and strict access controls can reduce exposure to potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-19T17:25:31.100Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b9e71a771bdb1749eb4c67

Added to database: 3/17/2026, 11:43:22 PM

Last enriched: 3/25/2026, 12:58:57 AM

Last updated: 4/30/2026, 8:03:44 PM

Views: 130

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses