Moxa Moxa’s Response Regarding the OpenSSL X.509 Email Address 4-byte Buffer Overflow Vulnerability (CVE-2022-3602)
OpenSSL CVE-2022-3602 is a buffer overflow in X.509 certificate verification that affects name constraint checking. A malicious email address in a certificate can overflow four bytes on the stack, potentially causing denial of service or remote code execution. Exploitation requires either a CA-signed malicious certificate or an application configured to ignore CA verification failures. Moxa has completed a vulnerability assessment and determined that none of their products are impacted by this vulnerability.
- A malicious X.509 certificate signed by a trusted CA, or an application configured to ignore CA verification failures
- Network access to TLS/SSL services on the target device
- The target application must perform X.509 name constraint checking
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ae9a2a6c-9f96-43d1-9b54-397630dd15d2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.