If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. Update (31 March 2023): The description of the policy processing enablement was corrected based on CVE-2023-0466.
We have discovered 16,092 live websites that are affected by CVE-2022-3996.
Product | ![]() |
Category | Web Server Extensions |
Vulnerable Domains | 16,092 live websites (2.40% of OpenSSL install base) |
Vulnerable Versions |
|
Vulnerable Versions Count | 7 versions ( 17.50% of all versions) |
![]() | 3,623 websites |
![]() | 2,345 websites |
![]() | 1,486 websites |
![]() | 1,317 websites |
![]() | 848 websites |
![]() | 774 websites |
![]() | 688 websites |
![]() | 523 websites |
![]() | 404 websites |
![]() | 397 websites |
.com | 5,684 websites |
.org | 685 websites |
.edu | 652 websites |
.net | 643 websites |
.ca | 638 websites |
.fi | 534 websites |
.jp | 534 websites |
.fr | 489 websites |
.de | 439 websites |
.co.uk | 422 websites |
Domain | Country | Rank | Contacts |
---|---|---|---|
*******.com | ![]() | *,*** | |
***.edu | ![]() | **,*** | |
******.org | ![]() | **,*** | |
********.org | ![]() | **,*** | |
********.com | ![]() | **,*** | |
*******.net | ![]() | **,*** | |
******.****.edu | ![]() | **,*** | |
************************.com | ![]() | **,*** | |
***.com | ![]() | **,*** | |
******.com | ![]() | **,*** |
FAQ