Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R5] OpenSSL '20150709' Advisory Affects Tenable Products



SecurityCenter and PVS are potentially impacted by a vulnerability in OpenSSL that was recently disclosed and fixed. Note that due to the time involved in doing a full analysis of the issue, Tenable has opted to patch the included version of OpenSSL as a precaution, and to save time.

OpenSSL crypto/x509/x509_vfy.c X509_verify_cert() Function Alternative Certificate Chain Handling Certificate Validation Bypass

OpenSSL contains a flaw in the X509_verify_cert() function in crypto/x509/x509_vfy.c that is triggered when locating alternate certificate chains in cases where the first attempt to build such a chain fails. This may allow a remote attacker to cause certain certificate checks to be bypassed, leading to an invalid presented certificate being considered as valid.

Please note that Tenable strongly recommends that SecurityCenter and PVS be installed on a subnet that is not Internet addressable.



Tenable has released a patch for SecurityCenter, 4.7.1, and 4.8.2 that addresses this vulnerability. This patch applies OpenSSL 1.0.1p, which is not affected. Upgrade information can be obtained from:


The patch can be obtained from:


File	   		      md5sum
SC-201507.2-4.x-rh5-32.tgz  1b36f27ede9f2456a5273b399890fae4
SC-201507.2-4.x-rh5-64.tgz  a01f077117b133a815b228e83676d7bc
SC-201507.2-4.x-rh6-32.tgz  9dea9ee20af9640c3a920907cae374d2
SC-201507.2-4.x-rh6-64.tgz  ba5e56b23b701a3df8307ccd23547f43

Users of SecurityCenter are not affected by this issue, as it was introduced in OpenSSL 1.0.1n and uses 1.0.1m.


Tenable has released version 4.4.0 that corresponds to the supported operating systems and architectures. This version bundles the updated OpenSSL library (1.0.2d), which is not affected. Upgrade information can be found at:


The updated version of PVS can be obtained from:


This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Try for Free Buy Now

Try Tenable.io Vulnerability Management


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.