OpenSSL session replay is a real and often overlooked threat. When using OpenSSL for TLS connections, sessions can be reused through session IDs or session tickets. If these are captured by an attacker—through packet sniffing, compromised logs, or unsafe memory—they can replay them to impersonate the client. No handshake required. No password prompt. Just instant access.
A TLS session works by establishing a shared key between client and server. To save time and CPU cycles, OpenSSL allows the reuse of that session via a session identifier. This identifier is supposed to be secret. But if it leaks, it becomes a skeleton key to the established connection. That is what makes an OpenSSL session replay attack so dangerous—it bypasses authentication and encryption without breaking the cryptography itself.
Risks get worse when session caching spans multiple servers. If ticket keys are shared across your load balancers without rotation, a stolen session remains valid everywhere until it expires. Expiry windows can be minutes or hours depending on configuration. For high-value targets, that window is enough.