A security vulnerability has been identified in all supported versions

of OpenSSL related to the verification of X.509 certificate chains
that include policy constraints. Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems.

Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00875}

epss

{'score': 0.00899}


Mon, 05 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: openssl

Published:

Updated: 2025-05-05T16:08:48.783Z

Reserved: 2023-01-24T13:50:25.835Z

Link: CVE-2023-0464

cve-icon Vulnrichment

Updated: 2024-08-02T05:10:56.350Z

cve-icon NVD

Status : Modified

Published: 2023-03-22T17:15:13.130

Modified: 2025-05-05T16:15:26.103

Link: CVE-2023-0464

cve-icon Redhat

Severity : Low

Publid Date: 2023-03-22T00:00:00Z

Links: CVE-2023-0464 - Bugzilla

cve-icon OpenCVE Enrichment

No data.