VYPR
High severityNVD Advisory· Published Jul 5, 2022· Updated Sep 17, 2024

AES OCB fails to encrypt some bytes

CVE-2022-2097

Description

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

AES OCB mode in OpenSSL on 32-bit x86 with AES-NI assembly fails to encrypt all data, potentially exposing 16 bytes of memory; fixed in OpenSSL 3.0.5 and 1.1.1q.

Vulnerability Description The AES OCB (Offset Codebook Mode) implementation in OpenSSL for 32-bit x86 platforms using the AES-NI assembly-optimized code fails to encrypt the entirety of the data under certain circumstances. This bug can result in sixteen bytes of data that was preexisting in memory being left unencrypted, potentially revealing sensitive information [2][4].

Attack Vector Exploiting this vulnerability requires the use of AES OCB mode on a 32-bit x86 system with AES-NI instructions and the assembly-optimized code path. Importantly, OpenSSL does not support OCB-based cipher suites for TLS or DTLS, so these protocols are not affected. The attack may be relevant in scenarios where applications directly use AES OCB encryption via OpenSSL's EVP interface [2].

Impact If successfully triggered, the vulnerability could disclose up to sixteen bytes of unencrypted data. In the special case of in-place encryption, those sixteen bytes correspond to plaintext, while otherwise they could be stale memory contents. The severity is rated MODERATE by OpenSSL [2].

Mitigation OpenSSL has released fixes in versions 3.0.5 (for 3.0.x) and 1.1.1q (for 1.1.x). Users running affected versions should update immediately. No workarounds are known. The Rust crate openssl-src has also been patched to include the fixed versions [4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
openssl-srccrates.io
< 111.22.0111.22.0
openssl-srccrates.io
>= 300.0.0, < 300.0.9300.0.9

Affected products

51

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

27

News mentions

0

No linked articles in our index yet.