matrixssl CVE Vulnerabilities & Metrics

Focus on matrixssl vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About matrixssl Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with matrixssl. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total matrixssl CVEs: 24
Earliest CVE date: 05 Jan 2017, 22:59 UTC
Latest CVE date: 22 Dec 2023, 04:15 UTC

Latest CVE reference: CVE-2023-24609

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical matrixssl CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.83

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 4
4.0-6.9 14
7.0-8.9 5
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS matrixssl CVEs

These are the five CVEs with the highest CVSS scores for matrixssl, sorted by severity first and recency.

All CVEs for matrixssl

CVE-2023-24609 matrixssl vulnerability CVSS: 0 22 Dec 2023, 04:15 UTC

Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate.

CVE-2022-46505 matrixssl vulnerability CVSS: 0 18 Jan 2023, 16:15 UTC

An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.

CVE-2022-43974 matrixssl vulnerability CVSS: 0 09 Jan 2023, 09:15 UTC

MatrixSSL 4.0.4 through 4.5.1 has an integer overflow in matrixSslDecodeTls13. A remote attacker might be able to send a crafted TLS Message to cause a buffer overflow and achieve remote code execution. This is fixed in 4.6.0.

CVE-2019-16747 matrixssl vulnerability CVSS: 5.0 30 Dec 2020, 21:15 UTC

In MatrixSSL before 4.2.2 Open, the DTLS server can encounter an invalid pointer free (leading to memory corruption and a daemon crash) via a crafted incoming network message, a different vulnerability than CVE-2019-14431.

CVE-2019-13629 matrixssl vulnerability CVSS: 4.3 03 Oct 2019, 14:15 UTC

MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.

CVE-2019-14431 matrixssl vulnerability CVSS: 7.5 29 Jul 2019, 22:15 UTC

In MatrixSSL 3.8.3 Open through 4.2.1 Open, the DTLS server mishandles incoming network messages leading to a heap-based buffer overflow of up to 256 bytes and possible Remote Code Execution in parseSSLHandshake in sslDecode.c. During processing of a crafted packet, the server mishandles the fragment length value provided in the DTLS message.

CVE-2019-13470 matrixssl vulnerability CVSS: 7.5 09 Jul 2019, 21:15 UTC

MatrixSSL before 4.2.1 has an out-of-bounds read during ASN.1 handling.

CVE-2019-10914 matrixssl vulnerability CVSS: 7.5 08 Apr 2019, 14:29 UTC

pubRsaDecryptSignedElementExt in MatrixSSL 4.0.1 Open, as used in Inside Secure TLS Toolkit, has a stack-based buffer overflow during X.509 certificate verification because of missing validation in psRsaDecryptPubExt in crypto/pubkey/rsa_pub.c.

CVE-2018-12439 matrixssl vulnerability CVSS: 1.9 15 Jun 2018, 02:29 UTC

MatrixSSL through 3.9.5 Open allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

CVE-2017-1000417 matrixssl vulnerability CVSS: 5.0 22 Jan 2018, 23:29 UTC

MatrixSSL version 3.7.2 adopts a collision-prone OID comparison logic resulting in possible spoofing of OIDs (e.g. in ExtKeyUsage extension) on X.509 certificates.

CVE-2017-1000415 matrixssl vulnerability CVSS: 4.3 09 Jan 2018, 20:29 UTC

MatrixSSL version 3.7.2 has an incorrect UTCTime date range validation in its X.509 certificate validation process resulting in some certificates have their expiration (beginning) year extended (delayed) by 100 years.

CVE-2017-2782 matrixssl vulnerability CVSS: 6.4 22 Jun 2017, 21:29 UTC

An integer overflow vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL 3.8.7b. A specially crafted x509 certificate can cause a length counter to overflow, leading to a controlled out of bounds copy operation. To trigger this vulnerability, a specially crafted x509 certificate must be presented to the vulnerable client or server application when initiating secure connection

CVE-2017-2781 matrixssl vulnerability CVSS: 7.5 22 Jun 2017, 21:29 UTC

An exploitable heap buffer overflow vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL 3.8.7b. A specially crafted x509 certificate can cause a buffer overflow on the heap resulting in remote code execution. To trigger this vulnerability, a specially crafted x509 certificate must be presented to the vulnerable client or server application when initiating secure connection.

CVE-2017-2780 matrixssl vulnerability CVSS: 7.5 22 Jun 2017, 21:29 UTC

An exploitable heap buffer overflow vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL 3.8.7b. A specially crafted x509 certificate can cause a buffer overflow on the heap resulting in remote code execution. To trigger this vulnerability, a specially crafted x509 certificate must be presented to the vulnerable client or server application when initiating secure connection.

CVE-2016-6884 matrixssl vulnerability CVSS: 4.3 03 Mar 2017, 16:59 UTC

TLS cipher suites with CBC mode in TLS 1.1 and 1.2 in MatrixSSL before 3.8.3 allow remote attackers to cause a denial of service (out-of-bounds read) via a crafted message.

CVE-2016-6883 matrixssl vulnerability CVSS: 4.3 03 Mar 2017, 16:59 UTC

MatrixSSL before 3.8.3 configured with RSA Cipher Suites allows remote attackers to obtain sensitive information via a Bleichenbacher variant attack.

CVE-2016-6882 matrixssl vulnerability CVSS: 4.3 03 Mar 2017, 16:59 UTC

MatrixSSL before 3.8.7, when the DHE_RSA based cipher suite is supported, makes it easier for remote attackers to obtain RSA private key information by conducting a Lenstra side-channel attack.

CVE-2016-8671 matrixssl vulnerability CVSS: 4.3 13 Jan 2017, 16:59 UTC

The pstm_exptmod function in MatrixSSL 3.8.6 and earlier does not properly perform modular exponentiation, which might allow remote attackers to predict the secret key via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6887.

CVE-2016-6887 matrixssl vulnerability CVSS: 4.3 13 Jan 2017, 16:59 UTC

The pstm_exptmod function in MatrixSSL 3.8.6 and earlier does not properly perform modular exponentiation, which might allow remote attackers to predict the secret key via a CRT attack.

CVE-2016-6886 matrixssl vulnerability CVSS: 5.0 13 Jan 2017, 16:59 UTC

The pstm_reverse function in MatrixSSL before 3.8.4 allows remote attackers to cause a denial of service (invalid memory read and crash) via a (1) zero value or (2) the key's modulus for the secret key during RSA key exchange.

CVE-2016-6885 matrixssl vulnerability CVSS: 5.0 13 Jan 2017, 16:59 UTC

The pstm_exptmod function in MatrixSSL before 3.8.4 allows remote attackers to cause a denial of service (invalid free and crash) via a base zero value for the modular exponentiation.

CVE-2016-6892 matrixssl vulnerability CVSS: 5.0 05 Jan 2017, 22:59 UTC

The x509FreeExtensions function in MatrixSSL before 3.8.6 allows remote attackers to cause a denial of service (free of unallocated memory) via a crafted X.509 certificate.

CVE-2016-6891 matrixssl vulnerability CVSS: 5.0 05 Jan 2017, 22:59 UTC

MatrixSSL before 3.8.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ASN.1 Bit Field primitive in an X.509 certificate.

CVE-2016-6890 matrixssl vulnerability CVSS: 10.0 05 Jan 2017, 22:59 UTC

Heap-based buffer overflow in MatrixSSL before 3.8.6 allows remote attackers to execute arbitrary code via a crafted Subject Alt Name in an X.509 certificate.