Impact
GnuTLS contains a logic error in processing multi‑record OCSP responses that allows a remote attacker to present a crafted response during a TLS handshake. If a client has OCSP verification enabled, it may mistakenly accept a revoked server certificate, thereby undermining the integrity of the TLS trust chain and potentially enabling man‑in‑the‑middle attacks. The flaw does not grant arbitrary code execution but directly compromises authentication and confidentiality by allowing clients to trust a revoked credential.
Affected Systems
Red Hat Enterprise Linux versions 6, 7, 8, 9 and 10, Red Hat Hardened Images, and Red Hat OpenShift Container Platform 4 are affected because they ship a vulnerable GnuTLS library. Specific version information is not supplied, so any instance that uses the unpatched GnuTLS implementation is at risk.
Risk and Exploitability
The CVSS score of 3.7 indicates moderate severity, and the vulnerability is accessible remotely through the TLS protocol, requiring only that the client performs OCSP verification. EPSS is not available and the issue is not listed in CISA’s KEV catalog, suggesting that widespread exploitation has not yet been observed. Nevertheless, the impact of accepting a revoked certificate is significant, as it can lead to credential compromise and data exfiltration if an attacker establishes a covert channel. The absence of a public workaround and moderate scoring implies that organizations should promptly patch or otherwise mitigate the flaw.
OpenCVE Enrichment