PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-6886 Matrixssl CVE debrief

CVE-2016-6886 affects MatrixSSL before 3.8.4 and can let a remote attacker trigger a crash during RSA key exchange. The issue is an invalid memory read in pstm_reverse, reached with a zero value or the key's modulus for the secret key. NVD rates the impact as high availability loss, and the vendor reference points to MatrixSSL 3.8.4 as the fix.

Vendor
Matrixssl
Product
CVE-2016-6886
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-13
Original CVE updated
2026-05-13
Advisory published
2017-01-13
Advisory updated
2026-05-13

Who should care

Operators and developers using MatrixSSL in exposed network services, especially deployments that still include MatrixSSL 3.8.3 or earlier and rely on RSA key exchange.

Technical summary

According to the NVD record, MatrixSSL versions up to and including 3.8.3 are vulnerable. The flaw is in pstm_reverse, where a zero value or the secret key's modulus can lead to an invalid memory read and process crash during RSA key exchange. NVD maps the issue to CWE-320 and assigns CVSS 3.0 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

Defensive priority

High — the issue is network-reachable, requires no privileges or user interaction, and can cause a denial of service in affected MatrixSSL deployments.

Recommended defensive actions

  • Upgrade MatrixSSL to 3.8.4 or later as indicated by the vendor advisory reference.
  • Inventory products and embedded components that bundle MatrixSSL and confirm whether they use version 3.8.3 or earlier.
  • Prioritize remediation on internet-facing services or appliances that use RSA key exchange with MatrixSSL.
  • If immediate upgrading is not possible, reduce exposure of affected services until patched and verify crash monitoring/alerting is in place.

Evidence notes

This debrief is based on the NVD CVE record and its listed references. The NVD metadata states the vulnerable version range ends at MatrixSSL 3.8.3, and the vendor advisory reference points to the MatrixSSL 3.8.4 release page. The CVE was published on 2017-01-13 and the NVD record was later modified on 2026-05-13; those dates are record timing, not the vulnerability creation date.

Official resources

Publicly disclosed CVE; the vendor reference indicates MatrixSSL 3.8.4 contains the fix.