Vulnerability identifier: #VU370
Vulnerability risk: Low
Exploitation vector: Network
Exploit availability: Yes
Vendor: OpenSSL Software Foundation
The vulnerability allows a remote attacker to decrypt transmitted data.
The vulnerability exists due to remote user's ability to control the network and capture long duration 3DES CBC mode encrypted session during which he can see a part of the text. In case of repeated sending the attacker can read the part and reconstruct the whole text.
Successful exploitation of this vulnerability may allow a remote attacker to decode transmitted data. This vulnerability is known as SWEET32.
Update to version 1.1.0.
Vulnerable software versions
OpenSSL: 0.9.8 - 0.9.8zg, 1.0.0 - 1.0.0s, 0.9.1b - 0.9.1c, 0.9.0b, 0.9.7 - 0.9.7m, 0.9.3 - 0.9.3a, 0.9.5 - 0.9.5a, 0.9.2b, 1.0.2 - 1.0.2h, 1.0.1 - 1.0.1t, 0.9.6 - 0.9.6m
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?