Description
Issue summary: An uncommon configuration of clients performing DANE TLSA-based
server authentication, when paired with uncommon server DANE TLSA records, may
result in a use-after-free and/or double-free on the client side.

Impact summary: A use after free can have a range of potential consequences
such as the corruption of valid data, crashes or execution of arbitrary code.

However, the issue only affects clients that make use of TLSA records with both
the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate
usage.

By far the most common deployment of DANE is in SMTP MTAs for which RFC7672
recommends that clients treat as 'unusable' any TLSA records that have the PKIX
certificate usages. These SMTP (or other similar) clients are not vulnerable
to this issue. Conversely, any clients that support only the PKIX usages, and
ignore the DANE-TA(2) usage are also not vulnerable.

The client would also need to be communicating with a server that publishes a
TLSA RRset with both types of TLSA records.

No FIPS modules are affected by this issue, the problem code is outside the
FIPS module boundary.
Published: 2026-04-07
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Use‑after‑free potentially leading to arbitrary code execution
Action: Immediate Patch
AI Analysis

Impact

An uncommon configuration of DANE TLSA records can cause a use‑after‑free or double‑free in OpenSSL client code. The vulnerability occurs when a client processes TLSA records that use both PKIX-TA/EE and DANE-TA certificate usages. The resulting memory corruption may invalidate data structures, crash the program, or allow an attacker to execute arbitrary code. The weakness is a classic example of improper memory handling.

Affected Systems

Computers running OpenSSL are affected. The CVE document does not list specific version numbers; affected systems use TLSA chains that contain both PKIX and DANE usages. Clients that ignore either family of TLSA record types or that never process TLSA records are not vulnerable.

Risk and Exploitability

The CVSS score is 8.1, indicating a high severity assessment, and the EPSS score is below 1 %, suggesting very low exploitation likelihood. The vulnerability is not currently included in the CISA KEV catalog. Exploitation would require a malicious server that provides a TLSA record set containing both PKIX and DANE usage types to a vulnerable client, which is an uncommon deployment scenario. The lack of a public exploit and the necessity of a specific cryptographic configuration reduce the immediate threat, but the potential for arbitrary code execution warrants timely remediation.

Generated by OpenCVE AI on April 28, 2026 at 16:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest OpenSSL patch or upgrade to a version that fixes the double‑free condition
  • Configure TLSA record usage to employ only PKIX or only DANE-TA certificate types, not both
  • Verify that your mail servers or other clients validate TLSA records in accordance with RFC 7672, rejecting PKIX usages in favor of DANE-TA where appropriate
  • Monitor OpenSSL advisories and update promptly if new mitigations are released

Generated by OpenCVE AI on April 28, 2026 at 16:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6201-1 openssl security update
Ubuntu USN Ubuntu USN USN-8155-1 OpenSSL vulnerabilities
Ubuntu USN Ubuntu USN USN-8155-2 OpenSSL vulnerabilities
History

Tue, 12 May 2026 13:30:00 +0000


Thu, 23 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 13 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1341
References
Metrics threat_severity

None

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Low


Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Openssl
Openssl openssl
Vendors & Products Openssl
Openssl openssl

Tue, 07 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description Issue summary: An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA records, may result in a use-after-free and/or double-free on the client side. Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, the issue only affects clients that make use of TLSA records with both the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate usage. By far the most common deployment of DANE is in SMTP MTAs for which RFC7672 recommends that clients treat as 'unusable' any TLSA records that have the PKIX certificate usages. These SMTP (or other similar) clients are not vulnerable to this issue. Conversely, any clients that support only the PKIX usages, and ignore the DANE-TA(2) usage are also not vulnerable. The client would also need to be communicating with a server that publishes a TLSA RRset with both types of TLSA records. No FIPS modules are affected by this issue, the problem code is outside the FIPS module boundary.
Title Potential Use-after-free in DANE Client Code
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: openssl

Published:

Updated: 2026-05-12T12:08:58.724Z

Reserved: 2026-02-27T13:45:02.161Z

Link: CVE-2026-28387

cve-icon Vulnrichment

Updated: 2026-04-13T13:00:32.514Z

cve-icon NVD

Status : Modified

Published: 2026-04-07T22:16:20.700

Modified: 2026-05-12T13:17:33.270

Link: CVE-2026-28387

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-07T00:00:00Z

Links: CVE-2026-28387 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T16:45:06Z

Weaknesses