OpenSSL PKCS12 Decoding crashes

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2024-011 CVE-2024-0727 01/25/2024 low v2

Vulnerability details

Processing a maliciously formatted PKCS12 file coming from untrusted source may lead OpenSSL to crash, leading to a potential Denial of Service attack

Impacted products

Stormshield Network Security low SNS is impacted


Version Date Description
v1 04/10/2024 Initial release
v2 04/15/2024 Update and disclosed

Stormshield Network Security

CVSS v3.1 Overall Score: 1.3      


Impacted version

A file in PKCS12 format can contain certificates and keys and may come from an untrusted source.

The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing.

If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.



  • SNS 4.7.0 to 4.7.4
  • SNS 4.3.0 to 4.3.24
  • SNS 3.11.0 to 3.11.28
  • SNS 3.7.0 to 3.7.40

Workaround solution


There is no workaround solution.

The following SNS versions will fix this vulnerability:

  • SNS 4.7.5
  • SNS 4.3.25
  • SNS 3.11.29
  • SNS 3.7.41

Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Network High High None Unchanged None None Low
CVSS Base score: 2.2 CVSS Vector: (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)
Exploit Code Maturity Remediation Level Report Confidence
Proof of concept code Official fix Reasonable
CVSS Temporal score: 1.9 CVSS Vector: (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:R)
Confidentiality Requirement Integrity Requirement Availability Requirement
Low Low Low
CVSS Environmental score: 1.3 CVSS Vector: (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:R/CR:L/IR:L/AR:L/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)