#VU38369 Inadequate Encryption Strength in SimpleSAMLphp


Published: 2017-09-01 | Updated: 2020-08-08

Vulnerability identifier: #VU38369

Vulnerability risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12871

CWE-ID: CWE-326

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SimpleSAMLphp
Web applications / Other software

Vendor: SimpleSAMLphp

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).

Mitigation
Install update from vendor's website.

Vulnerable software versions

SimpleSAMLphp: 1.14.0 - 1.14.11


External links
http://github.com/simplesamlphp/simplesamlphp/commit/77df6a932d46daa35e364925eb73a175010dc904
http://simplesamlphp.org/security/201703-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability