The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-9143

CVE-2024-9143: OpenSSL Elliptic Curve RCE Vulnerability

CVE-2024-9143 is a remote code execution vulnerability in OpenSSL's low-level GF(2^m) elliptic curve APIs that can cause out-of-bounds memory access. This article covers technical details, affected versions, and mitigation steps.

Published: January 28, 2026

CVE-2024-9143 Overview

CVE-2024-9143 is an out-of-bounds memory access vulnerability affecting OpenSSL's low-level GF(2^m) elliptic curve APIs. When untrusted explicit values for the field polynomial are provided to these APIs, the vulnerability can lead to out-of-bounds memory reads or writes, potentially causing application crashes or enabling remote code execution in certain scenarios.

The vulnerability impacts applications that work with "exotic" explicit binary (GF(2^m)) curve parameters that make it possible to represent invalid field polynomials with a zero constant term. While the likelihood of exploitation is considered low due to limited real-world usage of these specific API patterns, the potential impact of memory corruption makes this a noteworthy security concern for affected deployments.

Critical Impact

Out-of-bounds memory writes can lead to application crashes or potentially remote code execution in applications using exotic GF(2^m) curve parameters with untrusted input values.

Affected Products

  • OpenSSL versions prior to security patches released October 2024
  • Applications using EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and related BN_GF2m_*() functions with untrusted explicit curve parameters
  • Note: OpenSSL FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 are NOT affected

Discovery Timeline

  • 2024-10-16 - CVE-2024-9143 published to NVD
  • 2024-10-16 - OpenSSL releases security patches and advisory
  • 2025-11-03 - Last updated in NVD database

Technical Details for CVE-2024-9143

Vulnerability Analysis

This vulnerability resides in OpenSSL's implementation of elliptic curve cryptography, specifically within the binary field (GF(2^m)) polynomial handling code. The affected functions include EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions in the crypto/bn/bn_gf2m.c file.

When these APIs receive untrusted explicit values for field polynomials, particularly those that represent invalid polynomials with a zero constant term, the code can perform out-of-bounds array accesses. This occurs during the polynomial-to-array conversion process in BN_GF2m_poly2arr() and related functions.

Importantly, standard protocols using Elliptic Curve Cryptography typically either support only "named curves" or use X9.62 encoding for explicit curve parameters, which cannot represent the problematic input values. This significantly limits the practical attack surface. The X9.62 encoding used in X.509 certificates, for example, cannot trigger this vulnerability.

Root Cause

The root cause is insufficient input validation in the BN_GF2m_poly2arr() function when processing explicit field polynomial values. The function fails to properly validate that the polynomial has a valid constant term before performing array operations, allowing malformed input to cause memory access outside allocated buffer boundaries.

Attack Vector

The attack requires an application that:

  1. Uses the affected low-level GF(2^m) elliptic curve APIs
  2. Accepts explicit curve parameters from untrusted sources
  3. Uses a non-standard encoding that can represent invalid field polynomials with zero constant terms

An attacker would need to supply a specially crafted field polynomial value to trigger the out-of-bounds access. The network-based attack vector indicates exploitation can occur remotely if the vulnerable application processes attacker-controlled cryptographic parameters.

c
// Security patch from OpenSSL commit - Harden BN_GF2m_poly2arr against misuse
// Source: https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712

#include "bn_local.h"

#ifndef OPENSSL_NO_EC2M
# include <openssl/ec.h>

/*
 * Maximum number of iterations before BN_GF2m_mod_solve_quad_arr should

The patch adds additional header inclusion and validation to harden the BN_GF2m_poly2arr() function against misuse with malformed polynomial inputs.

Detection Methods for CVE-2024-9143

Indicators of Compromise

  • Application crashes or segmentation faults in processes using OpenSSL cryptographic operations
  • Unexpected termination of services that process elliptic curve parameters
  • Memory corruption signatures in application crash dumps referencing bn_gf2m.c or related EC functions
  • Anomalous cryptographic operation failures in logs

Detection Strategies

  • Monitor for process crashes in applications linked against vulnerable OpenSSL versions
  • Implement runtime memory protection tools (ASAN, Valgrind) in development/testing environments to detect out-of-bounds access
  • Review application code for usage of affected APIs: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and BN_GF2m_*() functions
  • Use software composition analysis (SCA) tools to identify vulnerable OpenSSL versions in your environment

Monitoring Recommendations

  • Enable core dump analysis for cryptographic services to identify potential exploitation attempts
  • Monitor system logs for OpenSSL-related error messages involving elliptic curve operations
  • Implement application-level monitoring for unexpected cryptographic operation failures
  • Deploy SentinelOne endpoint protection to detect memory corruption exploitation attempts

How to Mitigate CVE-2024-9143

Immediate Actions Required

  • Update OpenSSL to the patched version immediately on all affected systems
  • Audit applications for usage of the affected GF(2^m) elliptic curve APIs with untrusted input
  • Restrict applications to use only named curves rather than explicit curve parameters where possible
  • Apply vendor-specific patches from downstream distributions (Debian, NetApp, etc.)

Patch Information

OpenSSL has released security patches addressing this vulnerability. The fixes harden the BN_GF2m_poly2arr() function against misuse by adding proper input validation. Multiple commits have been published:

  • OpenSSL Commit Update
  • OpenSSL Commit Bug Fix
  • OpenSSL Commit Improvement
  • OpenSSL Commit Refactoring

For extended release branches, see the OpenSSL Extended Releases Commits. Additional information is available in the OpenSSL Security Advisory.

Distribution-specific patches are available:

  • Debian LTS Announcement
  • NetApp Security Advisory

Workarounds

  • Configure applications to reject explicit curve parameters and use only named/well-known curves
  • Implement input validation at the application layer to filter malformed elliptic curve parameters before they reach OpenSSL APIs
  • Consider disabling EC2M support entirely if binary field elliptic curves are not required (OPENSSL_NO_EC2M)
  • Isolate applications using legacy explicit curve parameters in sandboxed environments
bash
# Check OpenSSL version and verify patch status
openssl version -a

# Verify OpenSSL is compiled without EC2M if not needed
openssl ecparam -list_curves | grep -i "binary"

# Update OpenSSL on Debian/Ubuntu systems
sudo apt update && sudo apt upgrade openssl libssl-dev

# Update OpenSSL on RHEL/CentOS systems
sudo yum update openssl openssl-devel

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechOpenssl

  • SeverityMEDIUM

  • CVSS Score4.3

  • EPSS Probability0.66%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-125
  • Technical References
  • OpenSSL Commit Update

  • OpenSSL Commit Improvement

  • OpenSSL Commit Refactoring

  • OpenSSL Commit Bug Fix

  • OpenSSL Extended Releases Commit

  • OpenSSL Extended Releases Commit

  • OpenSSL Security Advisory

  • Openwall OSS-Security Discussion

  • Openwall OSS-Security Discussion

  • Openwall OSS-Security Discussion

  • Debian LTS Announcement

  • Debian LTS Announcement

  • NetApp Security Advisory
  • Related CVEs
  • CVE-2026-24695: XWEB Pro RCE Vulnerability

  • CVE-2022-2068: OpenSSL c_rehash Command Injection RCE

  • CVE-2022-1292: Siemens Brownfield Gateway RCE Vulnerability

  • CVE-2022-2274: OpenSSL RSA RCE Vulnerability on AVX512
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English