OpenSSL’s Public Key Panic: Major Flaw Fixed After Two-Year Calm
OpenSSL has patched a high-severity vulnerability, CVE-2024-12797, linked to RPKs, allowing potential MitM attacks. Discovered by Apple, the flaw affects versions 3.4, 3.3, and 3.2, with fixes rolled out. So, remember, when life gives you vulnerabilities, make sure you patch them—preferably before the hackers get their hands on them!

Hot Take:
Just when you thought it was safe to go back into the wild world of secure communications, OpenSSL drops a high-severity vulnerability bombshell. It’s like finding out your trusted security blanket has a few holes right after you’ve told everyone how warm and snug it is. Time to patch things up, quite literally!
Key Points:
- OpenSSL has patched a high-severity vulnerability (CVE-2024-12797) for the first time in two years.
- The flaw involves clients using RFC7250 raw public keys (RPKs) for server authentication.
- The vulnerability could allow man-in-the-middle (MitM) attacks due to handshake failures.
- OpenSSL versions 3.4, 3.3, and 3.2 are affected, but patches are available in versions 3.4.1, 3.3.2, and 3.2.4.
- Despite the scare, OpenSSL’s security has significantly improved since the infamous Heartbleed incident.
Already a member? Log in here