Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') The advisory has been revoked - it doesn't affect any version of package openssl.src  (opens in a new tab)


Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
94.07% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL10-OPENSSLSRC-15132520
  • published29 Jan 2026
  • disclosed14 Oct 2014

Introduced: 14 Oct 2014

CVE-2014-3566  (opens in a new tab)
CWE-757  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:10.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl.src package and not the openssl.src package as distributed by RHEL.

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

References