#VU639 Traffic decryption in Apple Inc. products - CVE-2016-2107

 

#VU639 Traffic decryption in Apple Inc. products - CVE-2016-2107

Published: September 23, 2016 / Updated: September 14, 2018


Vulnerability identifier: #VU639
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2016-2107
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
OpenSSL
Oracle Solaris
Oracle Linux
macOS
Oracle Access Manager
Oracle Exalogic Infrastructure
Oracle Enterprise Manager Ops Center
Enterprise Manager Base Platform
Oracle Agile Engineering Data Management
Oracle Business Intelligence Enterprise Edition
Oracle Transportation Management
Oracle Enterprise Session Border Controller
Oracle Life Sciences Data Hub
Primavera P6 Professional Project Management
PeopleSoft Enterprise PeopleTools
Oracle Communications Unified Session Manager
Oracle VM VirtualBox
Oracle Secure Global Desktop
Oracle E-Business Suite
Oracle Commerce Guided Search
Software vendor:
OpenSSL Software Foundation
Oracle
Apple Inc.

Description

The vulnerability allows a remote user to decrypt traffic on the target system.

The weakness is due to access control error.If the connection uses an AES CBC cipher and the server support AES-NI attackers can perform padding oracle attack.

Successful exploitation of the vulnerability leads to traffic decryption on the vulnerable system.

Remediation

Update 1.0.1 to 1.0.1t.
Update 1.0.2 to 1.0.2h.

External links