The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-2097

CVE-2022-2097: OpenSSL AES Information Disclosure Flaw

CVE-2022-2097 is an information disclosure vulnerability in OpenSSL's AES OCB mode on 32-bit x86 platforms that may expose sixteen bytes of sensitive data. This article covers technical details, affected versions, and mitigation.

Published: February 17, 2026

CVE-2022-2097 Overview

CVE-2022-2097 is a cryptographic vulnerability in OpenSSL affecting the AES OCB (Offset Codebook) mode encryption on 32-bit x86 platforms that utilize the AES-NI assembly optimized implementation. Under specific circumstances, the implementation fails to encrypt the entirety of the data, potentially exposing sixteen bytes of preexisting memory content or plaintext data.

This vulnerability specifically impacts scenarios where the AES-NI hardware acceleration is used on 32-bit x86 architectures. When "in place" encryption is performed, the flaw could directly reveal sixteen bytes of plaintext data. While the impact is limited to confidentiality, the exposure of unencrypted data in cryptographic operations represents a significant security concern for applications relying on AES OCB mode encryption.

Importantly, OpenSSL does not support OCB-based cipher suites for TLS and DTLS protocols, meaning standard TLS/DTLS communications are unaffected by this vulnerability.

Critical Impact

Partial encryption failure in AES OCB mode can expose up to sixteen bytes of sensitive plaintext or memory contents on affected 32-bit x86 systems using AES-NI optimization.

Affected Products

  • OpenSSL 3.0.0 through 3.0.4
  • OpenSSL 1.1.1 through 1.1.1p
  • Fedora 35 and 36
  • NetApp Active IQ Unified Manager
  • NetApp Clustered Data ONTAP Antivirus Connector
  • NetApp H-Series firmware (H300s, H500s, H700s, H410s, H410c)
  • Siemens SINEC INS (versions up to and including 1.0 SP2)
  • Debian Linux 10.0 and 11.0

Discovery Timeline

  • July 5, 2022 - CVE-2022-2097 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2022-2097

Vulnerability Analysis

This vulnerability stems from a flaw in the AES-NI assembly optimized implementation of AES OCB mode encryption specifically for 32-bit x86 platforms. The encryption routine fails to properly process all data blocks under certain conditions, leaving a 16-byte (128-bit) block unencrypted.

The impact manifests in two ways depending on the encryption operation mode:

  1. Standard encryption: Sixteen bytes of preexisting memory content that wasn't written to the output buffer may be revealed to an attacker
  2. In-place encryption: Sixteen bytes of the original plaintext data remains unencrypted and exposed

The vulnerability is categorized under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm), as the flawed implementation effectively breaks the confidentiality guarantees of the encryption operation. While AES OCB mode itself is a sound authenticated encryption algorithm, this implementation bug compromises its security properties on affected platforms.

Root Cause

The root cause lies in the AES-NI assembly optimized code path for 32-bit x86 architectures. The assembly implementation contains a logic error that causes it to skip encryption of a 16-byte data block under specific alignment or data length conditions. This results in either memory disclosure (when the output buffer contains residual data) or plaintext exposure (during in-place encryption operations).

The issue is specific to the assembly-optimized code path and does not affect the portable C implementation or 64-bit platforms.

Attack Vector

The attack vector for this vulnerability is network-based, as encrypted data transmitted over a network could contain the unencrypted 16-byte block. An attacker with the ability to capture encrypted traffic could potentially extract:

  • Sensitive data from memory that was not intended to be disclosed
  • Plaintext content that should have been encrypted

Exploitation requires that the target system meets all of the following conditions:

  • Running on a 32-bit x86 platform
  • Using OpenSSL's AES-NI assembly optimized implementation
  • Employing AES OCB mode for encryption
  • Processing data in a manner that triggers the specific code path with the bug

Applications using AES OCB mode for data-at-rest encryption or custom protocols (not TLS/DTLS) are most at risk.

Detection Methods for CVE-2022-2097

Indicators of Compromise

  • Presence of vulnerable OpenSSL versions (1.1.1 through 1.1.1p or 3.0.0 through 3.0.4) on 32-bit x86 systems
  • Applications explicitly configured to use AES OCB mode cipher operations
  • Log entries or error conditions related to encryption operations producing unexpected output sizes
  • Network traffic analysis showing potential plaintext leakage in encrypted streams using custom protocols

Detection Strategies

  • Inventory all systems running 32-bit x86 architectures and audit their OpenSSL versions using openssl version command
  • Review application code and configurations for use of AES OCB mode encryption (EVP_aes_*_ocb cipher functions)
  • Implement software composition analysis (SCA) tools to identify vulnerable OpenSSL library dependencies across the environment
  • Deploy network monitoring to detect anomalous patterns in encrypted traffic from affected systems

Monitoring Recommendations

  • Enable detailed logging for cryptographic operations in applications using OpenSSL on 32-bit platforms
  • Monitor for security advisories from vendors whose products embed OpenSSL (NetApp, Siemens, Fedora, Debian)
  • Implement file integrity monitoring on OpenSSL library files to detect unauthorized modifications or failed updates
  • Track EPSS score trends (currently 0.407%, 60.58th percentile) for changes in exploitation likelihood

How to Mitigate CVE-2022-2097

Immediate Actions Required

  • Upgrade OpenSSL to version 3.0.5 or later for 3.0.x branch, or version 1.1.1q or later for 1.1.1 branch
  • If immediate patching is not possible, avoid using AES OCB mode on affected 32-bit x86 systems
  • Audit applications to identify any custom use of AES OCB mode encryption that may be affected
  • Review and apply vendor-specific patches from NetApp, Siemens, Fedora, and Debian as applicable

Patch Information

OpenSSL has released patches addressing this vulnerability:

  • OpenSSL 3.0.5: Fixes the issue for the 3.0.x branch (affected versions: 3.0.0-3.0.4)
  • OpenSSL 1.1.1q: Fixes the issue for the 1.1.1 branch (affected versions: 1.1.1-1.1.1p)

The fixes are available in the following commits:

  • OpenSSL Commit 91992567 for OpenSSL 3.0.x
  • OpenSSL Commit A98F339D for OpenSSL 1.1.1

Additional vendor advisories:

  • OpenSSL Security Advisory July 2022
  • NetApp Security Advisory NTAP-20220715-0011
  • Siemens Security Advisory SSA-332410
  • Debian DSA-5343 Security Update

Workarounds

  • Switch from AES OCB mode to alternative authenticated encryption modes such as AES-GCM which are not affected by this vulnerability
  • Disable AES-NI hardware acceleration on affected 32-bit systems to force use of the portable C implementation (note: significant performance impact)
  • Migrate affected 32-bit x86 workloads to 64-bit platforms where the vulnerability does not manifest
  • Implement application-level validation to verify encryption output integrity before transmission
bash
# Check current OpenSSL version
openssl version

# Verify platform architecture
uname -m

# Update OpenSSL on Debian/Ubuntu
sudo apt-get update && sudo apt-get install --only-upgrade openssl libssl1.1

# Update OpenSSL on RHEL/CentOS/Fedora
sudo dnf update openssl

# Verify updated version
openssl version -a

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechOpenssl

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability0.41%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-327
  • Technical References
  • Siemens Security Advisory SSA-332410

  • OpenSSL Commit Diff 91992567

  • OpenSSL Commit Diff A98F339D

  • Debian LTS Announcement February 2023

  • Fedora Package Announcement R6CK57NB

  • Fedora Package Announcement V6567JE

  • Fedora Package Announcement VCMNWKER

  • Gentoo GLSA 202210-02

  • NetApp Security Advisory NTAP-20220715-0011

  • NetApp Security Advisory NTAP-20230420-0008

  • NetApp Security Advisory NTAP-20240621-0006

  • Debian DSA-5343 Security Update
  • Vendor Resources
  • OpenSSL Security Advisory July 2022
  • Related CVEs
  • CVE-2026-31790: OpenSSL Information Disclosure Flaw

  • CVE-2026-2673: OpenSSL TLS 1.3 Key Exchange Vulnerability

  • CVE-2025-69418: OpenSSL OCB Information Disclosure Flaw

  • CVE-2025-15469: OpenSSL Dgst Data Truncation Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English