CVE-2023-0466

Certificate policy check not enabled

Description

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

Category

5.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.67% Top 30%
Vendor Advisory openssl.org
Affected: OpenSSL OpenSSL
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-0466?
CVE-2023-0466 has been scored as a medium severity vulnerability.
How to fix CVE-2023-0466?
To fix CVE-2023-0466, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-0466 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-0466 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-0466?
CVE-2023-0466 affects OpenSSL OpenSSL.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.