CVE-2021-23840

7.5 HIGH
Published: February 16, 2021 Modified: April 16, 2026
View on NVD

Description

Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
Source: openssl-security@openssl.org
Third Party Advisory
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
Source: openssl-security@openssl.org
Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
Source: openssl-security@openssl.org
Third Party Advisory
https://security.gentoo.org/glsa/202103-03
Source: openssl-security@openssl.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210219-0009/
Source: openssl-security@openssl.org
Third Party Advisory
https://www.debian.org/security/2021/dsa-4855
Source: openssl-security@openssl.org
Third Party Advisory
https://www.openssl.org/news/secadv/20210216.txt
Source: openssl-security@openssl.org
Vendor Advisory
https://www.oracle.com//security-alerts/cpujul2021.html
Source: openssl-security@openssl.org
Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html
Source: openssl-security@openssl.org
Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
Source: openssl-security@openssl.org
Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html
Source: openssl-security@openssl.org
Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html
Source: openssl-security@openssl.org
Patch Third Party Advisory
https://www.tenable.com/security/tns-2021-03
Source: openssl-security@openssl.org
Third Party Advisory
https://www.tenable.com/security/tns-2021-09
Source: openssl-security@openssl.org
Third Party Advisory
https://www.tenable.com/security/tns-2021-10
Source: openssl-security@openssl.org
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/202103-03
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210219-0009/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240621-0006/
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.debian.org/security/2021/dsa-4855
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.openssl.org/news/secadv/20210216.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.oracle.com//security-alerts/cpujul2021.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.tenable.com/security/tns-2021-03
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.tenable.com/security/tns-2021-09
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.tenable.com/security/tns-2021-10
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

40 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
EPSS (Exploit Probability)
0.6%
70th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

openssl fujitsu tenable debian nodejs oracle mcafee