CVE-2026-22791Incorrect Calculation of Buffer Size in Opencryptoki

Severity
6.1MEDIUMNVD
CNA6.6
EPSS
0.0%
top 95.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13

Description

openCryptoki is a PKCS#11 library and tools for Linux and AIX. In 3.25.0 and 3.26.0, there is a heap buffer overflow vulnerability in the CKM_ECDH_AES_KEY_WRAP implementation allows an attacker with local access to cause out-of-bounds writes in the host process by supplying a compressed EC public key and invoking C_WrapKey. This can lead to heap corruption, or denial-of-service.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:HExploitability: 1.8 | Impact: 4.2

Affected Packages2 packages

CVEListV5opencryptoki/opencryptoki>= 3.25.0, <= 3.26.0
NVDopencryptoki_project/opencryptoki3.25.0, 3.26.0+1

Patches

🔴Vulnerability Details

2
CVEList
openCryptoki incorrectly calculates the buffer size in C_WrapKey with CKM_ECDH_AES_KEY_WRAP2026-01-13
OSV
CVE-2026-22791: openCryptoki is a PKCS#11 library and tools for Linux and AIX2026-01-13

📋Vendor Advisories

2
Red Hat
openCryptoki: openCryptoki: Denial of Service and heap corruption via heap buffer overflow2026-01-13
Debian
CVE-2026-22791: opencryptoki - openCryptoki is a PKCS#11 library and tools for Linux and AIX. In 3.25.0 and 3.2...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-22791 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-22791 — Incorrect Calculation of Buffer Size | cvebase