Changeflow GovPing Data Privacy & Cybersecurity OpenSSL Vulnerability Allows Bypassing Security...
Priority review Notice Added Final

OpenSSL Vulnerability Allows Bypassing Security Measures

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 15th, 2026
Detected March 16th, 2026
Email

Summary

CERT-Bund has issued a security advisory for OpenSSL versions prior to 3.6.2 and 3.5.6. A remote, authenticated attacker can exploit a vulnerability to bypass security measures. Mitigation is available.

What changed

CERT-Bund has released security advisory WID-SEC-2026-0729 concerning a vulnerability in OpenSSL versions prior to 3.6.2 and 3.5.6. The vulnerability, rated with a low CVSS Base Score of 3.1 and a low Temporal Score of 2.7, allows a remote, authenticated attacker to bypass security measures. This advisory applies to systems running UNIX and Windows, and potentially other operating systems.

Organizations utilizing affected OpenSSL versions should apply the available mitigation as soon as possible to prevent exploitation. While the advisory does not specify a compliance deadline, prompt action is recommended to address the security risk and prevent potential unauthorized access or data breaches. Further details on the specific CVE and available information can be found via the provided links.

What to do next

  1. Update OpenSSL to versions 3.6.2 or later, or 3.5.6 or later.
  2. Apply available mitigations for affected systems.

Source document (simplified)

[WID-SEC-2026-0729] OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen CVSS Base Score 3.1 (niedrig) CVSS Temporal Score 2.7 (niedrig) Remoteangriff ja Datum 15.03.2026 Stand 16.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

OpenSSL ist eine im Quelltext frei verfügbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.

Produkte

15.03.2026
- Open Source OpenSSL <3.6.2

  • Open Source OpenSSL <3.5.6

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in OpenSSL ausnutzen, um Sicherheitsvorkehrungen zu umgehen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 15th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies
Geographic scope
de

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities TLS/SSL

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.