OpenSSL’s MitM Mishap: CVE-2024-12797 Patched Just in Time!
OpenSSL patched the high-severity flaw CVE-2024-12797, which Apple discovered allowed man-in-the-middle attacks. The vulnerability affects clients using raw public keys and has been addressed in recent OpenSSL updates. Remember, folks, keeping your software updated is like flossing—tedious but essential to avoid nasty surprises!

Hot Take:
Oh, OpenSSL, you sneaky little library! Just when we thought you were keeping our secrets safe, you had a vulnerability lurking like a bad guy in a spy movie. Thanks to Apple for playing detective and catching this bug before it could go on a crime spree. But let’s be real, the real MVP here is Viktor Dukhovni for swooping in and saving the day with a patch. It’s like a digital soap opera, and I’m here for it!
Key Points:
- OpenSSL patched a high-severity flaw (CVE-2024-12797), enabling potential man-in-the-middle attacks.
- This vulnerability affects TLS clients that explicitly use raw public keys (RPKs) in SSL_VERIFY_PEER mode.
- The flaw was reported by Apple and fixed by Viktor Dukhovni.
- The issue impacts OpenSSL versions 3.2, 3.3, and 3.4, now patched in versions 3.2.4, 3.3.2, and 3.4.1.
- Previous high-severity flaws, CVE-2022-3602 and CVE-2022-3786, involved buffer overrun issues in OpenSSL.
Already a member? Log in here