CVE-2022-1473

HIGH

Openssl < 3.0.3 - Denial of Service

Title source: rule
STIX 2.1

Description

The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service. Also traversing the empty hash table entries will take increasingly more time. Typically such long lived processes might be TLS clients or TLS servers configured to accept client certificate authentication. The function was added in the OpenSSL 3.0 version thus older releases are not affected by the issue. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).

Scores

CVSS v3 7.5
EPSS 0.0027
EPSS Percentile 50.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-459
Status published
Products (27)
crates.io/openssl-src 300.0.0 - 300.0.6crates.io
netapp/a250_firmware
netapp/a700s_firmware
netapp/active_iq_unified_manager
netapp/aff_500f_firmware
netapp/aff_8300_firmware
netapp/aff_8700_firmware
netapp/aff_a400_firmware
netapp/clustered_data_ontap
netapp/clustered_data_ontap_antivirus_connector
... and 17 more
Published May 03, 2022
Tracked Since Feb 18, 2026