{"api_version":"1","generated_at":"2026-04-10T06:29:23+00:00","cve":"CVE-2024-0727","urls":{"html":"https://cve.report/CVE-2024-0727","api":"https://cve.report/api/cve/CVE-2024-0727.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-0727","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-0727"},"summary":{"title":"CVE-2024-0727","description":"Description unavailable.","state":"PUBLISHED","assigner":"","published_at":"2024-01-26 09:15:00","updated_at":"2024-02-02 15:53:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c","name":"3.1.5 git commit","refsource":"","tags":[],"title":"Add NULL checks where ContentInfo data can be NULL · openssl/openssl@d135eea · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539","name":"1.0.2zj git commit","refsource":"","tags":[],"title":"Sign in to your account · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.openssl.org/news/secadv/20240125.txt","name":"OpenSSL Advisory","refsource":"","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8","name":"1.1.1x git commit","refsource":"","tags":[],"title":"Sign in to your account · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2","name":"3.0.13 git commit","refsource":"","tags":[],"title":"Add NULL checks where ContentInfo data can be NULL · openssl/openssl@09df439 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a","name":"3.2.1 git commit","refsource":"","tags":[],"title":"Add NULL checks where ContentInfo data can be NULL · openssl/openssl@775acfd · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-0727","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0727","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"727","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2024","cve_id":"727","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"3.2.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2024-0727","qid":"200094","title":"Ubuntu Security Notification for Open Secure Sockets Layer (OpenSSL) Vulnerabilities (USN-6622-1)"},{"cve":"CVE-2024-0727","qid":"200107","title":"Ubuntu Security Notification for Open Secure Sockets Layer (OpenSSL) Vulnerabilities (USN-6632-1)"},{"cve":"CVE-2024-0727","qid":"200215","title":"Ubuntu Security Notification for Open Secure Sockets Layer (OpenSSL) Vulnerabilities (USN-6709-1)"},{"cve":"CVE-2024-0727","qid":"357238","title":"Amazon Linux Security Advisory for Open Secure Sockets Layer (OpenSSL) : ALAS2023-2024-520"},{"cve":"CVE-2024-0727","qid":"357266","title":"Amazon Linux Security Advisory for openssl11 : ALAS2-2024-2478"},{"cve":"CVE-2024-0727","qid":"357271","title":"Amazon Linux Security Advisory for Open Secure Sockets Layer (OpenSSL) : ALAS2-2024-2479"},{"cve":"CVE-2024-0727","qid":"357282","title":"Amazon Linux Security Advisory for edk2 : ALAS2-2024-2483"},{"cve":"CVE-2024-0727","qid":"357310","title":"Amazon Linux Security Advisory for openssl-snapsafe : ALAS2OPENSSL-SNAPSAFE-2024-005"},{"cve":"CVE-2024-0727","qid":"357333","title":"Amazon Linux Security Advisory for edk2 : ALAS2-2024-2502"},{"cve":"CVE-2024-0727","qid":"379545","title":"Splunk Enterprise Third Party Package Updates for March 2024 (SVD-2024-0303)"},{"cve":"CVE-2024-0727","qid":"379546","title":"Splunk Universal Forwarder Third Party Package Updates for March 2024 (SVD-2024-0304)"},{"cve":"CVE-2024-0727","qid":"38920","title":"Open Secure Sockets Layer (OpenSSL) Denial of Service Vulnerability"},{"cve":"CVE-2024-0727","qid":"510693","title":"Alpine Linux Security Update for Open Secure Sockets Layer (OpenSSL)"},{"cve":"CVE-2024-0727","qid":"510696","title":"Alpine Linux Security Update for Open Secure Sockets Layer (OpenSSL)"},{"cve":"CVE-2024-0727","qid":"520014","title":"Open Secure Sockets Layer (OpenSSL) NULL Pointer Dereference Vulnerability (CVE-2024-0727)"},{"cve":"CVE-2024-0727","qid":"673832","title":"EulerOS Security Update for Open Secure Sockets Layer (OpenSSL) (EulerOS-SA-2024-1242)"},{"cve":"CVE-2024-0727","qid":"674021","title":"EulerOS Security Update for Open Secure Sockets Layer (OpenSSL) (EulerOS-SA-2024-1220)"},{"cve":"CVE-2024-0727","qid":"674137","title":"EulerOS Security Update for Open Secure Sockets Layer (OpenSSL) (EulerOS-SA-2024-1512)"},{"cve":"CVE-2024-0727","qid":"674152","title":"EulerOS Security Update for Open Secure Sockets Layer (OpenSSL) (EulerOS-SA-2024-1491)"},{"cve":"CVE-2024-0727","qid":"691408","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for Open Secure Sockets Layer (OpenSSL) (10dee731-c069-11ee-9190-84a93843eb75)"},{"cve":"CVE-2024-0727","qid":"755771","title":"SUSE Enterprise Linux Security Update for openssl-3 (SUSE-SU-2024:0518-1)"},{"cve":"CVE-2024-0727","qid":"755801","title":"SUSE Enterprise Linux Security Update for Open Secure Sockets Layer (OpenSSL)-1_1 (SUSE-SU-2024:0549-1)"},{"cve":"CVE-2024-0727","qid":"755948","title":"SUSE Enterprise Linux Security Update for Open Secure Sockets Layer (OpenSSL)-3 (SUSE-SU-2024:0815-1)"},{"cve":"CVE-2024-0727","qid":"755949","title":"SUSE Enterprise Linux Security Update for Open Secure Sockets Layer (OpenSSL)-1_0_0 (SUSE-SU-2024:0814-1)"},{"cve":"CVE-2024-0727","qid":"755950","title":"SUSE Enterprise Linux Security Update for Open Secure Sockets Layer (OpenSSL)-1_1 (SUSE-SU-2024:0813-1)"},{"cve":"CVE-2024-0727","qid":"755953","title":"SUSE Enterprise Linux Security Update for openssl-1_0_0 (SUSE-SU-2024:0831-1)"},{"cve":"CVE-2024-0727","qid":"755954","title":"SUSE Enterprise Linux Security Update for openssl-1_1 (SUSE-SU-2024:0833-1)"},{"cve":"CVE-2024-0727","qid":"755956","title":"SUSE Enterprise Linux Security Update for openssl-1_1 (SUSE-SU-2024:0832-1)"},{"cve":"CVE-2024-0727","qid":"755958","title":"SUSE Enterprise Linux Security Update for compat-openssl098 (SUSE-SU-2024:0840-1)"},{"cve":"CVE-2024-0727","qid":"907968","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for Open Secure Sockets Layer (OpenSSL) (33937-1)"},{"cve":"CVE-2024-0727","qid":"907987","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nodejs (33935-1)"},{"cve":"CVE-2024-0727","qid":"997266","title":"Python (Pip) Security Update for cryptography (GHSA-9v9h-cgj8-h64p)"}]},"source_records":{"cve_program":null,"nvd":{"publishedDate":"2024-01-26 09:15:00","lastModifiedDate":"2024-02-02 15:53:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.2","versionEndExcluding":"1.0.2zj","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionStartIncluding":"1.1.1","versionEndExcluding":"1.1.1x","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.13","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.1.0","versionEndExcluding":"3.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:3.2.0:-:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}