๐Ÿ” CVE Alert

CVE-2026-32144

UNKNOWN 0.0

OCSP designated-responder authorization bypass via missing signature verification

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Improper Certificate Validation vulnerability in Erlang OTP public_key (pubkey_ocsp module) allows OCSP designated-responder authorization bypass via missing signature verification. The OCSP response validation in public_key:pkix_ocsp_validate/5 does not verify that a CA-designated responder certificate was cryptographically signed by the issuing CA. Instead, it only checks that the responder certificate's issuer name matches the CA's subject name and that the certificate has the OCSPSigning extended key usage. An attacker who can intercept or control OCSP responses can create a self-signed certificate with a matching issuer name and the OCSPSigning EKU, and use it to forge OCSP responses that mark revoked certificates as valid. This affects SSL/TLS clients using OCSP stapling, which may accept connections to servers with revoked certificates, potentially transmitting sensitive data to compromised servers. Applications using the public_key:pkix_ocsp_validate/5 API directly are also affected, with impact depending on usage context. This vulnerability is associated with program files lib/public_key/src/pubkey_ocsp.erl and program routines pubkey_ocsp:is_authorized_responder/3. This issue affects OTP from OTP 27.0 until OTP 28.4.2 and 27.3.4.10 corresponding to public_key from 1.16 until 1.20.3 and 1.17.1.2, and ssl from 11.2 until 11.5.4 and 11.2.12.7.

CWE CWE-295
Vendor erlang
Product otp
Published Apr 7, 2026
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for erlang otp

Be the first to know when new unknown vulnerabilities affecting erlang otp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Erlang / OTP
1.16 < *
Erlang / OTP
11.2 < *
Erlang / OTP
27.0 < * 601a012837ea0a5c8095bf24223132824177124d < *

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/erlang/otp/security/advisories/GHSA-gxrm-pf64-99xm cna.erlef.org: https://cna.erlef.org/cves/CVE-2026-32144.html osv.dev: https://osv.dev/vulnerability/EEF-CVE-2026-32144 erlang.org: https://www.erlang.org/doc/system/versions.html#order-of-versions github.com: https://github.com/erlang/otp/commit/ac7ff528be857c5d35eb29c7f24106e3a16d4891 github.com: https://github.com/erlang/otp/commit/49033a6d93a5be0ee0dce04e1fb8b4ae7de1e0c0

Credits

๐Ÿ” Igor Morgenstern / Aisle Research Jakub Witczak Ingela Anderton Andin