CVE-2018-5762

The TLS implementation in the TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 58.1 before 58.160, 59.1 before 059.1a.17 (IC #17), and 60.0 before 60.044 might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:unisys:clearpath_mcp:*:*:*:*:*:*:*:*
cpe:2.3:a:unisys:clearpath_mcp:*:*:*:*:*:*:*:*
cpe:2.3:a:unisys:clearpath_mcp:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:09

Type Values Removed Values Added
References () https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=46 - Vendor Advisory () https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=46 - Vendor Advisory

Information

Published : 2018-02-26 15:29

Updated : 2024-11-21 04:09


NVD link : CVE-2018-5762

Mitre link : CVE-2018-5762

CVE.ORG link : CVE-2018-5762


JSON object : View

Products Affected

unisys

  • clearpath_mcp