PatchSiren cyber security CVE debrief
CVE-2026-28389 Cert Portal CVE debrief
CVE-2026-28389 is a HIGH-severity denial-of-service vulnerability involving CMS EnvelopedData processing with KeyAgreeRecipientInfo. A crafted message can trigger a NULL pointer dereference when the optional parameters field of KeyEncryptionAlgorithmIdentifier is missing, which can crash affected software before authentication or cryptographic operations complete. The source advisory ties remediation to Siemens SIMATIC CN 4100 versions before 5.0 and notes that OpenSSL FIPS modules are not affected because the impacted code is outside the FIPS boundary.
- Vendor
- Cert Portal
- Product
- Siemens SIMATIC CN 4100 vers:intdot/<5.0
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-12
- Original CVE updated
- 2026-05-14
- Advisory published
- 2026-05-12
- Advisory updated
- 2026-05-14
Who should care
Siemens SIMATIC CN 4100 operators and maintainers, especially where systems process untrusted CMS or S/MIME content. Security teams responsible for software that calls CMS_decrypt() on attacker-controlled input should also review exposure and patch status.
Technical summary
The issue occurs during processing of a CMS EnvelopedData message using KeyAgreeRecipientInfo. The code examines the optional parameters field of KeyEncryptionAlgorithmIdentifier without checking whether it is present, leading to a NULL pointer dereference if the field is missing. The result is a crash/denial of service, not a confidentiality or integrity impact. The advisory states that OpenSSL FIPS modules in 3.6, 3.5, 3.4, 3.3, and 3.0 are not affected because the vulnerable code lies outside the FIPS module boundary.
Defensive priority
High
Recommended defensive actions
- Update Siemens SIMATIC CN 4100 to V5.0 or later.
- Identify any paths that process untrusted CMS EnvelopedData or S/MIME content and confirm whether CMS_decrypt() is reachable from attacker-controlled input.
- Limit or pre-validate untrusted CMS content before it reaches the affected parsing path, where operationally feasible.
- Review restart/crash monitoring for services that handle CMS data so a denial-of-service event is detected quickly.
- Use the official Siemens and CISA advisories to confirm product/version scope before scheduling remediation.
Evidence notes
This debrief is based on the CISA CSAF republication of Siemens ProductCERT advisory SSA-032379 for CVE-2026-28389. The source advisory was published on 2026-05-12 and republished/modified on 2026-05-14. The advisory explicitly describes a NULL pointer dereference in CMS EnvelopedData processing, a CVSS 3.1 score of 7.5 (HIGH), and remediation to V5.0 or later. It also states that the affected code is outside the OpenSSL FIPS module boundary.
Official resources
-
CVE-2026-28389 CVE record
CVE.org
-
CVE-2026-28389 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2026-05-12, with a CISA republication/update on 2026-05-14. Use the publication date as the CVE date context; do not treat later generation or review timestamps as the issue date.