wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as "ROBOT."
References
Configurations
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-002.txt - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/144389 - Issue Tracking, Mitigation, Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/102174 - Issue Tracking, Mitigation, Third Party Advisory, VDB Entry | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-464260.pdf - Third Party Advisory | |
References | () https://github.com/wolfSSL/wolfssl/pull/1229 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://robotattack.org/ - Issue Tracking, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 7.5 |
Information
Published : 2017-12-13 01:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-13099
Mitre link : CVE-2017-13099
CVE.ORG link : CVE-2017-13099
JSON object : View
Products Affected
wolfssl
- wolfssl
siemens
- scalance_w1750d
- scalance_w1750d_firmware
arubanetworks
- instant
CWE
CWE-203
Observable Discrepancy