Trellix response to the February 7, 2023 OpenSSL Security Advisory
Last Modified: 2023-02-23 14:16:24 Etc/GMT
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
After December 1, 2024, please log in to the Thrive Portal for support, knowledge articles, tools, and downloads. For information about using the Thrive Portal, view the Trellix Thrive Portal User Guide.
Trellix response to the February 7, 2023 OpenSSL Security Advisory
Technical Articles ID:
KB96301
Last Modified: 2023-02-23 14:16:24 Etc/GMT Environment
OpenSSL versions 3.0, 1.1.1, and 1.0.2
Summary
Recent updates to this article
NOTE: Trellix has authored the following Security Bulletin that covers this vulnerability: SB10395 Security Bulletin – Trellix/Skyhigh Security products status for OpenSSL 3.0, 1.1.1, 1.0.2 (CVE-2023-0286, CVE-2022-4304, CVE-2023-0215, and CVE-2022-4450) We're aware of CVE-2023-0286, recently released by OpenSSL. There's a type-confusion vulnerability relating to the X.400 address processing inside an X.509 Evaluation of potential impact to Trellix software is underway. This article will be updated as information becomes available. Owing to the severity of this vulnerability, we've created this article to provide communication about actions that customers can take to mitigate risk in their environment. Subscribe to this article to receive updates about related coverage and countermeasures. To receive email notification when this article is updated, click Subscribe on the right side of the page. You must be logged on to subscribe.
For further vendor information:
Problem
CVE-2023-0286 - "X.400 address type confusion in X.509 GeneralName" was released by OpenSSL on February 7, 2023. The following additional CVEs are related to this issue:
Solution
It's always advised, and a best practice, to make sure that software and operating systems are kept up to date on available patches and security updates as they're released. We also recommend evaluating and implementing general countermeasures against entry-level threats where suited in your environment. For more information, see KB91836 - Countermeasures for entry vector threats. We're evaluating product coverage across our portfolio of security solutions against this vulnerability. This article will be updated accordingly as possible coverage opportunities and countermeasures are identified. Affected ProductsLanguages:This article is available in the following languages: |
|