#VU370 Information disclosure in OpenSSL


Published: 2020-03-18 | Updated: 2023-03-31

Vulnerability identifier: #VU370

Vulnerability risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2016-2183

CWE-ID: CWE-327

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
OpenSSL
Server applications / Encryption software

Vendor: OpenSSL Software Foundation

Description

The vulnerability allows a remote attacker to decrypt transmitted data.

The vulnerability exists due to remote user's ability to control the network and capture long duration 3DES CBC mode encrypted session during which he can see a part of the text. In case of repeated sending the attacker can read the part and reconstruct the whole text.

Successful exploitation of this vulnerability may allow a remote attacker to decode transmitted data. This vulnerability is known as SWEET32.

Mitigation
Update to version 1.1.0.

Vulnerable software versions

OpenSSL: 0.9.8 - 0.9.8zg, 1.0.0 - 1.0.0s, 0.9.1b - 0.9.1c, 0.9.0b, 0.9.7 - 0.9.7m, 0.9.3 - 0.9.3a, 0.9.5 - 0.9.5a, 0.9.2b, 1.0.2 - 1.0.2h, 1.0.1 - 1.0.1t, 0.9.6 - 0.9.6m


External links
http://www.openssl.org/news/changelog.html#x0


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability