Impact
An OpenSSL TLS 1.3 server that uses the keyword 'DEFAULT' to include the built‑in default key‑agreement group list can lose the tuple structure that separates groups of roughly equivalent security. This defect causes the server to treat all supported groups as a single sufficiently secure set. As a consequence, when a client predicts only classical groups, the server may select a less preferred group, such as a classical key exchange, even though both sides support a more secure post‑quantum group. This results in a downgrade or sub‑optimal key agreement, weakening the cryptographic protection of the TLS session.
Affected Systems
The vulnerability impacts OpenSSL releases 3.5 and 3.6 when the server configuration includes the DEFAULT keyword, either directly or by incorporating the default list into a custom configuration. No other versions (3.4, 3.3, 3.0, 1.0.2, 1.1.1) or any FIPS modules are affected.
Risk and Exploitability
The CVSS base score of 7.5 reflects a high severity impact on cryptographic strength. The EPSS score is below 1 % and the vulnerability is not listed in CISA’s KEV catalog, indicating a low likelihood of exploitation in the wild. The attack likely involves an attacker who can influence the server’s configuration to use the DEFAULT keyword or manipulate the client’s KeyShare prediction, thereby forcing the server to negotiate a weaker key agreement. The vulnerability does not provide a path to arbitrary code execution, data tampering, or denial of service.
OpenCVE Enrichment