OCSP_basic_verify may incorrectly verify the response signing certificate
Description
The function OCSP_basic_verify verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of OCSP_basic_verify will not use the OCSP_NOCHECKS flag. In this case the OCSP_basic_verify function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
When the non-default OCSP_NOCHECKS flag is used, OpenSSL's OCSP_basic_verify returns success even if the signing certificate fails verification.
Vulnerability
The function OCSP_basic_verify in OpenSSL versions 3.0.0, 3.0.1, and 3.0.2 incorrectly handles the non-default OCSP_NOCHECKS flag. When this flag is set, the function returns a positive result (indicating successful verification) even when the response signing certificate fails to verify. The command line ocsp application with the "-no_cert_checks" option is similarly affected. [1][2]
Exploitation
An attacker does not need authentication or special network position. To trigger the bug, the OCSP verifying application must explicitly pass the OCSP_NOCHECKS flag to OCSP_basic_verify, or the OCSP command must be invoked with the "-no_cert_checks" option. When that non-default flag is used, the function returns a success indicator despite the underlying certificate validation failure. The responsible code path is reachable without user interaction. [1][2]
Impact
A successful exploitation causes the OCSP response verification to incorrectly report success. This can lead to acceptance of an invalid or malicious OCSP response, undermining certificate revocation checks. The impact is on integrity, as a failed verification is reported as successful, potentially allowing a revoked or unauthorized certificate to be accepted. No confidentiality or availability impact is described. [1][2]
Mitigation
OpenSSL 3.0.3, released on 3 May 2022, fixes this vulnerability. Users of affected OpenSSL 3.0.0 through 3.0.2 should upgrade to 3.0.3. For the Rust openssl-src crate, versions >= 300.0.6 contain the fix, while versions prior to 300.0 are unaffected. The default code paths (without the OCSP_NOCHECKS flag) are not vulnerable. [1][2][4]
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openssl-srccrates.io | >= 300.0.0, < 300.0.6 | 300.0.6 |
Affected products
18- osv-coords17 versionspkg:apk/chainguard/ruby-3.1pkg:apk/chainguard/ruby-3.1-basepkg:apk/chainguard/ruby-3.1-base-devpkg:apk/chainguard/ruby-3.1-devpkg:apk/chainguard/ruby-3.1-docpkg:apk/wolfi/ruby-3.1pkg:apk/wolfi/ruby-3.1-basepkg:apk/wolfi/ruby-3.1-base-devpkg:apk/wolfi/ruby-3.1-devpkg:apk/wolfi/ruby-3.1-docpkg:cargo/openssl-srcpkg:rpm/almalinux/opensslpkg:rpm/almalinux/openssl-develpkg:rpm/almalinux/openssl-libspkg:rpm/almalinux/openssl-perlpkg:rpm/opensuse/openssl-3&distro=openSUSE%20Leap%2015.4pkg:rpm/suse/openssl-3&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4
< 0+ 16 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: >= 300.0.0, < 300.0.6
- (no CPE)range: < 1:3.0.1-41.el9_0
- (no CPE)range: < 1:3.0.1-41.el9_0
- (no CPE)range: < 1:3.0.1-41.el9_0
- (no CPE)range: < 1:3.0.1-41.el9_0
- (no CPE)range: < 3.0.1-150400.4.7.1
- (no CPE)range: < 3.0.1-150400.4.7.1
- Range: Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- github.com/advisories/GHSA-mfm6-r9g2-q4r7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-1343ghsaADVISORY
- cert-portal.siemens.com/productcert/pdf/ssa-953464.pdfghsaWEB
- git.openssl.org/gitweb/ghsaWEB
- github.com/github/advisory-database/issues/405ghsaWEB
- rustsec.org/advisories/RUSTSEC-2022-0027.htmlghsaWEB
- security.netapp.com/advisory/ntap-20220602-0009ghsaWEB
- www.openssl.org/news/secadv/20220503.txtghsaWEB
- git.openssl.org/gitweb/mitre
- security.netapp.com/advisory/ntap-20220602-0009/mitre
News mentions
0No linked articles in our index yet.