Cavium Nitrox SSL, Nitrox V SSL, and TurboSSL software development kits (SDKs) allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/102170 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039984 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171212-bleichenbacher | Third Party Advisory |
https://www.cavium.com/security-advisory-cve-2017-17428.html | Vendor Advisory |
https://www.kb.cert.org/vuls/id/144389 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/102170 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039984 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171212-bleichenbacher | Third Party Advisory |
https://www.cavium.com/security-advisory-cve-2017-17428.html | Vendor Advisory |
https://www.kb.cert.org/vuls/id/144389 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/102170 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039984 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171212-bleichenbacher - Third Party Advisory | |
References | () https://www.cavium.com/security-advisory-cve-2017-17428.html - Vendor Advisory | |
References | () https://www.kb.cert.org/vuls/id/144389 - Third Party Advisory, US Government Resource |
Information
Published : 2018-03-05 18:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-17428
Mitre link : CVE-2017-17428
CVE.ORG link : CVE-2017-17428
JSON object : View
Products Affected
cisco
- adaptive_security_appliance_5550_firmware
- adaptive_security_appliance_5505_firmware
- webex_conect_im
- adaptive_security_appliance_5510_firmware
- ace_4710_application_control_engine
- adaptive_security_appliance_5510
- webex_meetings
- adaptive_security_appliance_5520_firmware
- adaptive_security_appliance_5540_firmware
- adaptive_security_appliance_5540
- adaptive_security_appliance_5550
- ace4710_application_control_engine_firmware
- adaptive_security_appliance_5520
- ace30_application_control_engine_module
- adaptive_security_appliance_5505
- ace30_application_control_engine_module_firmware
cavium
- octeon_ssl_sdk
- turbossl_sdk
- nitrox_v_ssl_sdk
- octeon_sdk
- nitrox_ssl_sdk
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm