Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-41678

rust-openssl provides OpenSSL bindings for the Rust programming language. From to before 0.10.78, aes::unwrap_key() contains an incorrect assertion: it checks that out.len() + 8 <= in_.len(), but this condition is reversed. The intended invariant is out.len() >= in_.len() - 8, ensuring the output buffer is large enough. Because of the inverted check, the function only accepts buffers at or below the minimum required size and rejects larger ones. If a smaller buffer is provided the function will write past the end of out by in_.len() - 8 - out.len() bytes, causing an out-of-bounds write from a safe public function. This vulnerability is fixed in 0.10.78.

View on NVD

Analysis

The rust-openssl crate, widely used for cryptography in Rust applications, contains a critical buffer overflow vulnerability in versions prior to 0.10.78. Due to an inverted logic check in the aes::unwrap_key function, an attacker could trigger an out-of-bounds write, potentially leading to remote code execution in applications performing key unwrapping operations.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-787

EPSS

Probability of exploitation (next 30 days): 0.0006 (0.1%)
Percentile: 18.2%
EPSS: 2026-05-06

Affects

rust-openssl_project:rust-openssl

Technical description

rust-openssl provides OpenSSL bindings for the Rust programming language. From to before 0.10.78, aes::unwrap_key() contains an incorrect assertion: it checks that out.len() + 8 <= in_.len(), but this condition is reversed. The intended invariant is out.len() >= in_.len() - 8, ensuring the output buffer is large enough. Because of the inverted check, the function only accepts buffers at or below the minimum required size and rejects larger ones. If a smaller buffer is provided the function will write past the end of out by in_.len() - 8 - out.len() bytes, causing an out-of-bounds write from a safe public function. This vulnerability is fixed in 0.10.78.

Published: 4/24/2026, 6:16:29 PM
Last modified: 4/28/2026, 5:41:42 PM

References

HomeEventsBlogResourcesTeam