Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 7.5, indicating it can be exploited remotely over the network with relatively low complexity without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts and availability (service disruption) for affected systems. Impacting 31 products from openssl, from netapp, from netapp and 28 others, organizations running these solutions should prioritize assessment and patching.
Reported in 2024, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.
2024-09-03T16:15:07.177
2025-06-03T10:51:54.117
Analyzed
CVSSv3.1: 7.5 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | openssl | openssl | < 3.0.15 | Yes |
| Application | openssl | openssl | < 3.1.7 | Yes |
| Application | openssl | openssl | < 3.2.3 | Yes |
| Application | openssl | openssl | < 3.3.2 | Yes |
| Application | netapp | active_iq_unified_manager | - | Yes |
| Application | netapp | management_services_for_element_software_and_netapp_hci | - | Yes |
| Application | netapp | ontap_9 | - | Yes |
| Application | netapp | ontap_select_deploy_administration_utility | - | Yes |
| Application | netapp | ontap_tools | 9 | Yes |
| Operating System | netapp | brocade_fabric_operating_system | - | Yes |
| Operating System | netapp | h300s_firmware | - | Yes |
| Hardware | netapp | h300s | - | No |
| Operating System | netapp | h500s_firmware | - | Yes |
| Hardware | netapp | h500s | - | No |
| Operating System | netapp | h700s_firmware | - | Yes |
| Hardware | netapp | h700s | - | No |
| Operating System | netapp | h410s_firmware | - | Yes |
| Hardware | netapp | h410s | - | No |
| Operating System | netapp | h410c_firmware | - | Yes |
| Hardware | netapp | h410c | - | No |
| Operating System | netapp | h610c_firmware | - | Yes |
| Hardware | netapp | h610c | - | No |
| Operating System | netapp | h610s_firmware | - | Yes |
| Hardware | netapp | h610s | - | No |
| Hardware | netapp | h615c | - | Yes |
| Operating System | netapp | h615c_firmware | - | No |
| Operating System | netapp | bootstrap_os | - | Yes |
| Hardware | netapp | hci_compute_node | - | No |
| Operating System | netapp | a250_firmware | - | Yes |
| Hardware | netapp | a250 | - | No |
| Operating System | netapp | 500f_firmware | - | Yes |
| Hardware | netapp | 500f | - | No |
| Operating System | netapp | c250_firmware | - | Yes |
| Hardware | netapp | c250 | - | No |
SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For openssl's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.