Outage in Cumulocity

OpenSSL 3.0 vulnerability information

Resolved Major
October 31, 2022 - Started over 1 year ago - Lasted 4 days
Official incident page

Need to monitor Cumulocity outages?
Stay on top of outages with IsDown. Monitor the official status pages of all your vendors, SaaS, and tools, including Cumulocity, and never miss an outage again.
Start Free Trial

Outage Details

Please be informed that OpenSSL has made an announcement about their forthcoming release of their next version, which will be released on Tuesday (1st Nov, 2022). This release is expected to include a fix for a HIGH security vulnerability. CVE: unknown CVSS Score: unknown Vulnerability Details: unknown Severity: High Reference: https://mta.openssl.org/pipermail/openssl-announce/2022-October/000238.html Versions that are vulnerable: - OpenSSL versions 3.0 and above. - OpenSSL version 3.0.7 is expected to be released on Tuesday (1st Nov, 2022) with the fix for this vulnerability. From our current analysis, the vulnerability does NOT impact the current GA versions of Cumulocity IoT Public Clouds, and Edge deployments, as the affected versions are not used in the Cumulocity platform. Once we have further details, we will analyse the impact of the vulnerability in the context of the Cumulocity IoT Platform and take the necessary actions if required. Please watch out for updates on the status page - https://status.cumulocity.com/
Latest Updates ( sorted recent to last )
RESOLVED over 1 year ago - at 11/04/2022 04:09PM

After analysing the vulnerability, we consider current releases of Cumulocity IoT Platform are not affected. However, if your microservices leverage vulnerable OpenSSL versions for the outbound TLS connections, it is advised to upgrade OpenSSL library to version 3.0.7.

Once we have further details, we will analyse the impact of the vulnerability in the context of the Cumulocity IoT Platform and take the necessary actions if required.

Thank you for your continued co-operation.

MONITORING over 1 year ago - at 11/02/2022 07:10AM

OpenSSL - X.509 Email Address 4-byte Buffer Overflow and X.509 Email Address Variable Length Buffer Overflow.

CVE: CVE-2022-3786, CVE-2022-3602
CVSS Score: N/A
Vulnerability Details: A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. An attacker can craft a malicious email address in the certificates to create a buffer overflow that could result in a crash (causing a denial of service) or potentially remote code execution.
Severity: High
Reference: https://mta.openssl.org/pipermail/openssl-announce/2022-October/000238.html

• OpenSSL versions 3.0.0 to 3.0.6 are vulnerable to this issue.
• OpenSSL 3.0 users should upgrade to OpenSSL 3.0.7.
• OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.

The details published in the CVE are analysed in the context of Cumulocity IoT cloud and Cumulocity IoT Edge. After analysing the vulnerability, we consider current releases of Cumulocity IoT Platform are not affected. However, if your microservices leverage vulnerable OpenSSL versions for the outbound TLS connections, it is advised to upgrade OpenSSL library to version 3.0.7 as recommended above.

For updates regarding public Cumulocity IoT platforms that we operate, refer to the status page - https://status.cumulocity.com/.

Change log:
31st October 2022 - Initial Publication
02nd November 2022 – Advisory updated after CVE details were available.

INVESTIGATING over 1 year ago - at 11/01/2022 05:04PM

Latest updates are available from
https://www.openssl.org/news/secadv/20221101.txt
https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786

INVESTIGATING over 1 year ago - at 10/31/2022 04:08PM

Please be informed that OpenSSL has made an announcement about their forthcoming release of their next version, which will be released on Tuesday (1st Nov, 2022). This release is expected to include a fix for a HIGH security vulnerability.

CVE: unknown
CVSS Score: unknown
Vulnerability Details: unknown
Severity: High
Reference: https://mta.openssl.org/pipermail/openssl-announce/2022-October/000238.html

Versions that are vulnerable:
- OpenSSL versions 3.0 and above.
- OpenSSL version 3.0.7 is expected to be released on Tuesday (1st Nov, 2022) with the fix for this vulnerability.

From our current analysis, the vulnerability does NOT impact the current GA versions of Cumulocity IoT Public Clouds, and Edge deployments, as the affected versions are not used in the Cumulocity platform.

Once we have further details, we will analyse the impact of the vulnerability in the context of the Cumulocity IoT Platform and take the necessary actions if required.

Please watch out for updates on the status page - https://status.cumulocity.com/

The best way to monitor Cumulocity and all your cloud services

With IsDown, you can monitor all your critical services' official status pages from one centralized dashboard and receive instant alerts the moment an outage is detected. Say goodbye to constantly checking multiple sites for updates and stay ahead of outages with IsDown.

Start free trial

No credit card required · Cancel anytime · 3153 services available

Integrations with Slack Microsoft Teams Google Chat Datadog PagerDuty Zapier Discord Webhook

Setup in 5 minutes or less

How much time you'll save your team, by having the outages information close to them?

14-day free trial · No credit card required · Cancel anytime