The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data.
For more information on this vulnerability please visit: https://nvd.nist.gov/vuln/detail/CVE-2022-4450
CVSS 3 : 7.5
Product | Package | Status |
Lighthouse | OpenSSL | Impacted ,This issue will be resolved in the next release |
OM1200 OM2200 CM8100 |
OpenSSL |
Impacted ,This issue will be resolved in the next release |
Classic Console IM7200 CM7100 ACM7000 |
OpenSSL | Not impacted |
Comments
0 comments
Please sign in to leave a comment.