#VU7318 Padding oracle attack


Published: 2017-07-05

Vulnerability identifier: #VU7318

Vulnerability risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-10668

CWE-ID: CWE-696

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
OSCI-Transport Library
Universal components / Libraries / Libraries used by multiple products

Vendor: KoSIT

Description
The vulnerability allows a remote attacker to conduct a padding oracle attack.

The weakness exists in the encryption library due to a flaw in implementation of a number of deprecated encryption algorithms (Triple DES, AES 129, AES 192, and AES 256, all in CBC mode). A remote attacker can conduct man-in-the-middle attack to analyse the CBC mode padding and decrypt the transport encryption.

Successful exploitation of the vulnerability results in decryption of the transport encryption.

Mitigation
Update to version 1.7.1.

Vulnerable software versions

OSCI-Transport Library: 1.6.1


CPE

External links
http://blog.sec-consult.com/2017/06/german-e-government-details-vulnerabilities.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability