CVE-2026-31790 – OpenSSL

CVSS 7.5 IMPORTANT

“A small weakness in encryption handling can bring secure systems to a halt.”

OpenSSL released a security update to fix a vulnerability that could allow attackers to trigger a denial-of-service condition through crafted inputs. The issue affects how the library processes certain cryptographic operations, potentially causing services that rely on OpenSSL to become unresponsive. CVE-2026-31790 has a CVSS score of 7.5, which is High severity. This makes it a serious concern for any system depending on OpenSSL for secure communications.

No verified real-world exploitation or proof-of-concept code has been confirmed. Despite that, the widespread use of OpenSSL amplifies the potential impact, as disruption at the cryptographic layer can cascade across applications and services. The patch improves input handling and stabilizes processing to prevent service interruption.

Key Details

Affected Product
Openssl Openssl
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
CWE Classification
CWE-754
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.