The TLS implementation in the TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 58.1 before 58.160, 59.1 before 059.1a.17 (IC #17), and 60.0 before 60.044 might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.
References
Link | Resource |
---|---|
https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=46 | Vendor Advisory |
https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=46 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=46 - Vendor Advisory |
Information
Published : 2018-02-26 15:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-5762
Mitre link : CVE-2018-5762
CVE.ORG link : CVE-2018-5762
JSON object : View
Products Affected
unisys
- clearpath_mcp
CWE