This vulnerability occurs when an application modifies an OpenSSL context object after it has already been used to create active SSL/TLS connections.
In OpenSSL, the SSL_CTX object acts as a template for creating individual SSL connection objects. When you change settings in the SSL_CTX after SSL objects have already been instantiated from it, those existing connections may unexpectedly inherit the new configuration. This can lead to inconsistent security states across your application's connections. For developers, this means that security-critical modifications—like changing authentication modes, cipher suites, or certificate settings—should be applied to the SSL_CTX before creating any SSL objects. Once connections are established, altering the parent context introduces unpredictable behavior and can potentially weaken or bypass authentication controls for previously created sessions.
Impact: Bypass Protection Mechanism
No authentication takes place in this process, bypassing an assumed protection of encryption.
Impact: Read Application Data
The encrypted communication between a user and a trusted host may be subject to a sniffing attack.
c