openCryptoki is a PKCS#11 library and tools for Linux and AIX. In 3.25.0 and 3.26.0, there is a heap buffer overflow vulnerability in the CKM_ECDH_AES_KEY_WRAP implementation allows an attacker with local access to cause out-of-bounds writes in the host process by supplying a compressed EC public key and invoking C_WrapKey. This can lead to heap corruption, or denial-of-service.
References
Configurations
Configuration 1 (hide)
|
History
03 Feb 2026, 18:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/opencryptoki/opencryptoki/commit/785d7577e1477d12fbe235554e7e7b24f2de34b7 - Patch | |
| References | () https://github.com/opencryptoki/opencryptoki/commit/e37e9127deeeb7bf3c3c4d852c594256c57ec3a8 - Patch | |
| References | () https://github.com/opencryptoki/opencryptoki/security/advisories/GHSA-26f5-3mwq-4wm7 - Exploit, Patch, Vendor Advisory | |
| First Time |
Opencryptoki Project opencryptoki
Opencryptoki Project |
|
| CPE | cpe:2.3:a:opencryptoki_project:opencryptoki:3.25.0:*:*:*:*:*:*:* cpe:2.3:a:opencryptoki_project:opencryptoki:3.26.0:*:*:*:*:*:*:* |
Information
Published : 2026-01-13 19:16
Updated : 2026-02-03 18:47
NVD link : CVE-2026-22791
Mitre link : CVE-2026-22791
CVE.ORG link : CVE-2026-22791
JSON object : View
Products Affected
opencryptoki_project
- opencryptoki
CWE
CWE-131
Incorrect Calculation of Buffer Size
