CVE-2026-32144

NameCVE-2026-32144
DescriptionImproper Certificate Validation vulnerability in Erlang OTP public_key (pubkey_ocsp module) allows OCSP designated-responder authorization bypass via missing signature verification. The OCSP response validation in public_key:pkix_ocsp_validate/5 does not verify that a CA-designated responder certificate was cryptographically signed by the issuing CA. Instead, it only checks that the responder certificate's issuer name matches the CA's subject name and that the certificate has the OCSPSigning extended key usage. An attacker who can intercept or control OCSP responses can create a self-signed certificate with a matching issuer name and the OCSPSigning EKU, and use it to forge OCSP responses that mark revoked certificates as valid. This affects SSL/TLS clients using OCSP stapling, which may accept connections to servers with revoked certificates, potentially transmitting sensitive data to compromised servers. Applications using the public_key:pkix_ocsp_validate/5 API directly are also affected, with impact depending on usage context. This vulnerability is associated with program files lib/public_key/src/pubkey_ocsp.erl and program routines pubkey_ocsp:is_authorized_responder/3. This issue affects OTP from OTP 27.0 until OTP 28.4.2 and 27.3.4.10 corresponding to public_key from 1.16 until 1.20.3 and 1.17.1.2, and ssl from 11.2 until 11.5.4 and 11.2.12.7.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
erlang (PTS)bullseye1:23.2.6+dfsg-1+deb11u1fixed
bullseye (security)1:23.2.6+dfsg-1+deb11u3fixed
bookworm1:25.2.3+dfsg-1+deb12u3fixed
bookworm (security)1:25.2.3+dfsg-1+deb12u1fixed
trixie1:27.3.4.1+dfsg-1+deb13u1vulnerable
forky1:27.3.4.9+dfsg-1vulnerable
sid1:27.3.4.10+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
erlangsourcebullseye(not affected)
erlangsourcebookworm(not affected)
erlangsource(unstable)1:27.3.4.10+dfsg-1

Notes

[bookworm] - erlang <not-affected> (Vulnerable code not present, only affects 27 and later)
[bullseye] - erlang <not-affected> (Vulnerable code not present, only affects 27 and later)
https://github.com/erlang/otp/security/advisories/GHSA-gxrm-pf64-99xm
https://github.com/erlang/otp/pull/10873
https://cna.erlef.org/cves/CVE-2026-32144.html
Fixed by: https://github.com/erlang/otp/commit/ac7ff528be857c5d35eb29c7f24106e3a16d4891 (OTP-28.4.2)
fixed by: https://github.com/erlang/otp/commit/49033a6d93a5be0ee0dce04e1fb8b4ae7de1e0c0 (OTP-27.3.4.10)

Search for package or bug name: Reporting problems