A vulnerability in the TLS protocol implementation of legacy Cisco ASA 5500 Series (ASA 5505, 5510, 5520, 5540, and 5550) devices could allow an unauthenticated, remote attacker to access sensitive information, aka a Return of Bleichenbacher's Oracle Threat (ROBOT) attack. An attacker could iteratively query a server running a vulnerable TLS stack implementation to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions. Cisco Bug IDs: CSCvg97652.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/102170 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171212-bleichenbacher | Issue Tracking Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
No history.
Information
Published : 2017-12-15 20:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-12373
Mitre link : CVE-2017-12373
CVE.ORG link : CVE-2017-12373
JSON object : View
Products Affected
cisco
- adaptive_security_appliance_5520_firmware
- adaptive_security_appliance_5550
- adaptive_security_appliance_5505
- adaptive_security_appliance_5540_firmware
- adaptive_security_appliance_5510
- adaptive_security_appliance_5540
- adaptive_security_appliance_5550_firmware
- adaptive_security_appliance_5520
- adaptive_security_appliance_5505_firmware
- adaptive_security_appliance_5510_firmware