Jan 2, 2026·7 min read·11 visits
OpenSSL trusted the user-supplied length field in Heartbeat packets without verifying the actual payload size. This allowed attackers to 'over-read' the heap, leaking sensitive data like SSL private keys and user passwords. It affected nearly two-thirds of the internet upon disclosure.
A catastrophic missing bounds check in the OpenSSL Heartbeat extension allowed remote attackers to read up to 64KB of process memory, exposing private keys, session tokens, and user credentials.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N| Product | Affected Versions | Fixed Version |
|---|---|---|
OpenSSL OpenSSL Software Foundation | 1.0.1 - 1.0.1f | 1.0.1g |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-126 (Buffer Over-read) |
| CVSS Score | 7.5 (High) |
| Attack Vector | Network |
| EPSS Score | 94.47% |
| Exploit Status | Active / Weaponized |
| Impact | Information Disclosure (Critical) |
The software reads from a buffer using length parameters that attacker can control, allowing access to memory outside the intended buffer.