Home Microsoft CVE-2026-34054
Back to Microsoft

CVE-2026-34054

vcpkg - OpenSSL

Microsoft CVSS 7.8 Updated March 31, 2026

Executive Risk Summary

"A vulnerability in vcpkg's Windows builds of OpenSSL prior to version 3.6.1#3 allows an attacker to target a specific path on customer machines. This issue has been patched in version 3.6.1#3, and users are advised to update to the latest version."

Anticipated Attack Path

  1. 1. An attacker discovers the vulnerable path on a customer machine
  2. 2. The attacker exploits the vulnerability to gain unauthorized access
  3. 3. The attacker uses the access to steal sensitive data or disrupt operations

Am I Vulnerable?

  • Are you using vcpkg with OpenSSL on Windows?
  • Is your vcpkg version prior to 3.6.1#3?
  • Have you applied the patch for this vulnerability?

Operational Audit Arsenal

Target Type Compiled Library
Target Asset OpenSSL (libcrypto / libssl)
Standard Path Manual - [vcpkg_root]\installed\
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: OpenSSL (libcrypto / libssl) (Compiled Library)
$Targets = @('OpenSSL (libcrypto','libssl)')
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Minimal to Moderate

Internal Work Notes

CVE-2026-34054: Manual verification required. Identify all applications compiled with vcpkg OpenSSL builds prior to 3.6.1#3. Recompile with latest vcpkg port.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.