CVE-2024-37305

8.2 HIGH

📋 TL;DR

CVE-2024-37305 is a buffer overflow vulnerability in oqs-provider that handles post-quantum cryptography for OpenSSL 3. Attackers can craft malicious hybrid keys/signatures to cause crashes or leak sensitive memory information. This affects systems using oqs-provider for post-quantum cryptography in TLS, X.509, or S/MIME.

💻 Affected Systems

Products:
  • oqs-provider
Versions: All versions before v0.6.1
Operating Systems: All platforms running oqs-provider
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects hybrid (traditional + post-quantum) key operations. Plain post-quantum operations are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, though information leakage is more likely given the vulnerability type.

🟠

Likely Case

Denial of service through application crashes or information disclosure via memory leaks.

🟢

If Mitigated

Limited impact if systems are behind firewalls with strict input validation and monitoring.

🌐 Internet-Facing: HIGH - TLS servers using vulnerable oqs-provider could be exploited remotely via crafted certificates or signatures.
🏢 Internal Only: MEDIUM - Internal systems using vulnerable oqs-provider could be exploited by authenticated users or via internal attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malformed hybrid keys or signatures, which could be delivered via TLS handshakes, certificates, or S/MIME messages.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.6.1

Vendor Advisory: https://github.com/open-quantum-safe/oqs-provider/security/advisories/GHSA-pqvr-5cr8-v6fx

Restart Required: Yes

Instructions:

1. Stop services using oqs-provider. 2. Update oqs-provider to v0.6.1 via package manager or source compilation. 3. Restart affected services. 4. Verify the update was successful.

🔧 Temporary Workarounds

No workarounds available

all

The advisory states there are no workarounds for this vulnerability.

🧯 If You Can't Patch

  • Disable hybrid key operations in oqs-provider configuration if possible
  • Implement network segmentation and strict firewall rules to limit access to affected systems

🔍 How to Verify

Check if Vulnerable:

Check oqs-provider version: openssl list -provider oqsprovider 2>/dev/null | grep -i version

Check Version:

openssl list -provider oqsprovider 2>/dev/null | grep -i version

Verify Fix Applied:

Verify version is v0.6.1 or later: openssl list -provider oqsprovider 2>/dev/null | grep -i version

📡 Detection & Monitoring

Log Indicators:

  • Application crashes related to oqs-provider
  • Memory access violation errors in system logs
  • Unexpected termination of TLS services

Network Indicators:

  • Unusual TLS handshake failures
  • Malformed certificate or signature traffic patterns

SIEM Query:

source="*" ("oqs-provider" OR "liboqs") AND ("crash" OR "segmentation fault" OR "memory violation")

🔗 References

📤 Share & Export