CVE-2017-4118 - Unpatched OpenSSL Vulnerability

UNKNOWN No Patch (2837 days)

Threat Intelligence

Low Risk
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

OpenSSL is a widely used cryptographic library. This vulnerability allows attackers to execute arbitrary code on your server by exploiting a buffer overflow in the SSLv3 protocol.

Am I affected?

You're affected if you use OpenSSL versions prior to 1.0.2k-fips or 1.1.1h, which are vulnerable to the Heartbleed bug. Check with: openssl version

Note: This is not a new vulnerability in modern versions of OpenSSL (1.1.1 and later), but rather an unpatched vulnerability in older versions.

Affected Packages

maven: org.mortbay.jetty:jetty-server pypi: pycryptodome

Affected Products

OpenSSL Project / OpenSSL

How to fix

Upgrade to OpenSSL 1.0.2k-fips or later for the most secure version.
- For immediate mitigation, consider disabling SSLv3 protocol support until you can upgrade.