PatchSiren cyber security CVE debrief
CVE-2016-6886 Matrixssl CVE debrief
CVE-2016-6886 affects MatrixSSL before 3.8.4 and can let a remote attacker trigger a crash during RSA key exchange. The issue is an invalid memory read in pstm_reverse, reached with a zero value or the key's modulus for the secret key. NVD rates the impact as high availability loss, and the vendor reference points to MatrixSSL 3.8.4 as the fix.
- Vendor
- Matrixssl
- Product
- CVE-2016-6886
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-13
- Advisory updated
- 2026-05-13
Who should care
Operators and developers using MatrixSSL in exposed network services, especially deployments that still include MatrixSSL 3.8.3 or earlier and rely on RSA key exchange.
Technical summary
According to the NVD record, MatrixSSL versions up to and including 3.8.3 are vulnerable. The flaw is in pstm_reverse, where a zero value or the secret key's modulus can lead to an invalid memory read and process crash during RSA key exchange. NVD maps the issue to CWE-320 and assigns CVSS 3.0 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Defensive priority
High — the issue is network-reachable, requires no privileges or user interaction, and can cause a denial of service in affected MatrixSSL deployments.
Recommended defensive actions
- Upgrade MatrixSSL to 3.8.4 or later as indicated by the vendor advisory reference.
- Inventory products and embedded components that bundle MatrixSSL and confirm whether they use version 3.8.3 or earlier.
- Prioritize remediation on internet-facing services or appliances that use RSA key exchange with MatrixSSL.
- If immediate upgrading is not possible, reduce exposure of affected services until patched and verify crash monitoring/alerting is in place.
Evidence notes
This debrief is based on the NVD CVE record and its listed references. The NVD metadata states the vulnerable version range ends at MatrixSSL 3.8.3, and the vendor advisory reference points to the MatrixSSL 3.8.4 release page. The CVE was published on 2017-01-13 and the NVD record was later modified on 2026-05-13; those dates are record timing, not the vulnerability creation date.
Official resources
-
CVE-2016-6886 CVE record
CVE.org
-
CVE-2016-6886 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed CVE; the vendor reference indicates MatrixSSL 3.8.4 contains the fix.