CVE-2016-10931
Description
An issue was discovered in the openssl crate before 0.9.0 for Rust. There is an SSL/TLS man-in-the-middle vulnerability because certificate verification is off by default and there is no API for hostname verification.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The openssl crate for Rust prior to 0.9.0 disabled certificate verification by default, enabling man-in-the-middle attacks.
In the openssl crate (Rust bindings) before version 0.9.0, TLS certificate verification was disabled by default and the API lacked hostname verification functionality. This means that without explicit configuration, SSL/TLS connections would not validate the authenticity of the server's certificate [1][3].
An attacker with network access could intercept the communication by presenting any arbitrary certificate, which the client would accept. The vulnerability is a classic man-in-the-middle due to insecure defaults. No authentication or special privileges are required beyond network position [3].
Successful exploitation allows the attacker to decrypt and read or modify the encrypted traffic, compromising confidentiality and integrity of data transmitted over TLS. The RustSec advisory rates this as HIGH severity (CVSS 8.1) [3].
The issue is fixed in version 0.9.0 of the openssl crate. Users should upgrade to 0.9.0 or later. The release notes for 0.9.0 detail major changes, including addressing these insecure defaults [2][4].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
opensslcrates.io | < 0.9.0 | 0.9.0 |
Affected products
2- Rust/openssldescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-34p9-f4q3-c4r7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2016-10931ghsaADVISORY
- github.com/sfackler/rust-openssl/releases/tag/v0.9.0ghsaWEB
- rustsec.org/advisories/RUSTSEC-2016-0001.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.