Radware Alteon devices with a firmware version between 31.0.0.0-31.0.3.0 are vulnerable to an adaptive-chosen ciphertext attack ("Bleichenbacher attack"). This allows an attacker to decrypt observed traffic that has been encrypted with the RSA cipher and to perform other private key operations.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/102199 | Third Party Advisory VDB Entry |
https://robotattack.org/ | Technical Description |
https://support.radware.com/app/answers/answer_view/a_id/1010361/~/cve-2017-17427-adaptive-chosen-ciphertext-attack-vulnerability | Mitigation Vendor Advisory |
https://www.kb.cert.org/vuls/id/144389 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/102199 | Third Party Advisory VDB Entry |
https://robotattack.org/ | Technical Description |
https://support.radware.com/app/answers/answer_view/a_id/1010361/~/cve-2017-17427-adaptive-chosen-ciphertext-attack-vulnerability | Mitigation Vendor Advisory |
https://www.kb.cert.org/vuls/id/144389 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/102199 - Third Party Advisory, VDB Entry | |
References | () https://robotattack.org/ - Technical Description | |
References | () https://support.radware.com/app/answers/answer_view/a_id/1010361/~/cve-2017-17427-adaptive-chosen-ciphertext-attack-vulnerability - Mitigation, Vendor Advisory | |
References | () https://www.kb.cert.org/vuls/id/144389 - Third Party Advisory, US Government Resource |
Information
Published : 2017-12-13 16:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-17427
Mitre link : CVE-2017-17427
CVE.ORG link : CVE-2017-17427
JSON object : View
Products Affected
radware
- alteon_firmware
- alteon
CWE
CWE-203
Observable Discrepancy