In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMSdecrypt or PKCS7decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
{
"license": "CC-BY-4.0",
"sources": [
{
"database_specific": {
"status": "Modified"
},
"imported": "2026-04-27T16:32:26.455Z",
"id": "CVE-2019-1563",
"published": "2019-09-10T17:15:11.890Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2019-1563",
"modified": "2024-11-21T04:36:49.310Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1563"
},
{
"id": "GHSA-rv3r-f48w-6vvh",
"imported": "2026-04-27T16:34:15.394Z",
"published": "2022-05-24T16:55:53Z",
"url": "https://api.github.com/advisories/GHSA-rv3r-f48w-6vvh",
"modified": "2024-04-04T01:55:07Z",
"html_url": "https://github.com/advisories/GHSA-rv3r-f48w-6vvh"
},
{
"id": "EUVD-2019-10120",
"imported": "2026-04-27T16:33:20.939Z",
"published": "2019-09-10T16:58:35Z",
"url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2019-10120",
"modified": "2024-09-17T01:11:46Z",
"html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2019-10120"
}
]
}