• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

OpenSSL hit with new critical vulnerability anew

By Guest Authors

Security researchers have found a new vulnerability in the OpenSSL infrastructure that could give attackers the leeway to intrude an otherwise secure communications network.

The critical flaw in OpenSSL, in addition to the Heartbleed vulnerability, is designed to lure computers into recognizing a fake digital certificate as legit. Once a sham digital certificate is accepted, hackers could then perform man in the middle attacks against the network, thereby eavesdropping on secure communication lines between private users who would then believe they are indeed exchanging messages in a safe environment.

openssl-vulnerability

The OpenSSL finds popular use in implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) cryptographic protocols. Majority of web servers in the world use the open source software.

The vulnerability spotted had something to do with the OpenSSL’s ability to verify certificates. That means the accuracy of the verification process has been comprised.

Here’s the explanation for it all. A connecting device moves a step higher in the chain of certificate issuances if it fails to confirm that a certificate has been truly warranted by a trusted Certificate Authority. SSL certificates are issued from the root certificate authority up to various intermediate CAs and ultimately through the end user certificate. If it cannot locate a trusted certificate authority, an error message will be returned, thus denying a secure connection.

The OpenSSL will determine another alternative chain upon failure of previous attempts to create certificate chains. Because of an error in implementing the process of finding an alternative chain, a vulnerability comes out. Consequently, attackers will be able to work their way around checks on CAs that are untrusted.

Also, an attacker will be able to use an end user certificate to disguise itself as a CA and, thereby, issue illegitimate certificates that will be considered by the victim computer as a trusted certificate.

SSL and TLS client software often perform the task of validating a chain of certificates. SSL and TLS client software could include browsers and email servers, which are susceptible to the flaw discovered if they use an edition of OpenSSL for verifying certificate chain that has been affected by the vulnerability.

Luckily, web servers are safe from the vulnerability if they are not for authenticating site visitors, or if they authenticate site visitors in other instances, those visitors must be using passwords.

OpenSSL versions affected by this vulnerability include versions 1.0.2c, 1.0.2b, 1.0.1n, and 1.0.1o. Versions 1.0.2b and 1.0.2c users need to upgrade to 1.0.2d, while versions 1.0.1n and 1.0.1o users must upgrade to 1.0.1p.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Baseus Nomos 245W Charging Station Review – A Desk Upgrade That Finally Makes Sense

Pexar Starlight 15.6″ Digital Photo Frame Review – Turning Family Photos Into Gallery-Worthy Displays

Phomemo PM64D – The Next-Gen Shipping Label Printer Review

Ugee Trio Pad UT3 Review – A Giant Matte Tablet That Feels Almost Like E-Ink

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • Smart Pool Tech Reaches a New Peak: iGarden X Series Swim Jet Wins Big at CES 2026
  • How to Convert AA-Battery Operated Christmas Decorations to Plug-In Power
  • How to Season Bisetti Cutting Board and Avoid Cracking
  • AHR Expo 2026: Midea Building Technologies Addresses AI Energy Bottleneck with Data Center Cooling

Copyright © 2026 ยท All Rights Reserved