OpenSSL’s Public Key Panic: Major Flaw Fixed After Two-Year Calm

OpenSSL has patched a high-severity vulnerability, CVE-2024-12797, linked to RPKs, allowing potential MitM attacks. Discovered by Apple, the flaw affects versions 3.4, 3.3, and 3.2, with fixes rolled out. So, remember, when life gives you vulnerabilities, make sure you patch them—preferably before the hackers get their hands on them!

Pro Dashboard

Hot Take:

Just when you thought it was safe to go back into the wild world of secure communications, OpenSSL drops a high-severity vulnerability bombshell. It’s like finding out your trusted security blanket has a few holes right after you’ve told everyone how warm and snug it is. Time to patch things up, quite literally!

Key Points:

  • OpenSSL has patched a high-severity vulnerability (CVE-2024-12797) for the first time in two years.
  • The flaw involves clients using RFC7250 raw public keys (RPKs) for server authentication.
  • The vulnerability could allow man-in-the-middle (MitM) attacks due to handshake failures.
  • OpenSSL versions 3.4, 3.3, and 3.2 are affected, but patches are available in versions 3.4.1, 3.3.2, and 3.2.4.
  • Despite the scare, OpenSSL’s security has significantly improved since the infamous Heartbleed incident.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?