Type Confusion Vulnerability in OpenSSL's PKCS#7 Signature Verification
CVE-2026-22796
What is CVE-2026-22796?
A type confusion vulnerability exists in the signature verification process of PKCS#7 data in OpenSSL. This flaw occurs when the ASN1_TYPE union member is accessed without proper type validation, potentially leading to an invalid or NULL pointer dereference. This defect may allow an attacker to cause a Denial of Service by supplying a malformed signed PKCS#7 data to applications performing signature verification. As a result, invoking the problematic PKCS7_digest_from_attributes() function can lead to crashes, impacting system availability. Impact assessments indicate that this vulnerability is limited in severity due to the legacy nature of the PKCS#7 API, with a recommendation for migration to the CMS API for enhanced security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
OpenSSL 3.6.0 < 3.6.1
OpenSSL 3.5.0 < 3.5.5
OpenSSL 3.4.0 < 3.4.4
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved