Get in Touch

Get in Touch

Get in Touch

Please get in touch using the form below.

Close form

Home / Threat Intelligence bulletins / RCE vulnerability in OpenSSL


A recent release of OpenSSL was found to be vulnerable to a memory corruption bug when running on certain processor architectures (CVE-2022-2274). OpenSSL is an open source library to implement TLS encryption, which is used in many different web server software stacks.

The vulnerability was added in OpenSSL version 3.0.4, released on 21 June 2022. It only affects x64 systems on specialist processors with the AVX-512 (Advanced Vector Extensions) instruction set. The issue is with the RSA implementation and can cause memory corruption. By exploiting this, an attacker may be able to execute code on the machine performing the computation.


A remote attacker may be able to run code on some web servers running the latest release of OpenSSL or leak private data to the attacker.

Vulnerability Detection

Check which version of OpenSSL is installed using the following command:
openssl version

On Linux it’s possible to see which instructions your processor supports using:

cat /proc/cpuinfo

Affected Products

SSL/TLS servers or other servers using 2048 bit RSA private keys, running on machines supporting AVX512-IFMA instruction as part of the X86_64 architecture.

AVX-512 support is found in the following processors:


Zen 4


Knights Landing
Knights Mill
Cannon Lake
Cascade Lake
Cooper Lake
Ice Lake
Rocket Lake
Tiger Lake
Alder Lake
Sapphire Rapids

Containment, Mitigations & Remediations

Users of the OpenSSL 3.0.4 version should upgrade to OpenSSL 3.0.5.

OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.

Indicators of Compromise

None observed.

Threat Landscape

An RCE in a widely used, public facing library could have an incredibly high impact. Fortunately this vulnerability only affects a very limited subset of OpenSSL users and was noticed soon after its introduction. For comparison, the Heartbleed vulnerability (CVE-2014-0160) was introduced in 2012 and was present in production systems for years before the advisory was published in 2014.

Mitre Methodologies

T1190 – Exploit Public-Facing Application

Further Information

Heap memory corruption with RSA private key operation

Notes on OpenSSL remote memory corruption

AVX512-specific heap buffer overflow with 3.0.4 release