Lucene search

K
f5F5F5:K15564
HistorySep 11, 2015 - 12:00 a.m.

K15564 : TLS vulnerability CVE-2014-3511

2015-09-1100:00:00
my.f5.com
29

4.7 Medium

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.007 Low

EPSS

Percentile

78.0%

Security Advisory Description

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a “protocol downgrade” issue.
(
CVE-2014-3511
)
Impact
Vulnerable hosts may be subject to a man-in-the-middle attack by forcing a downgrade to TLS 1.0, even if both the server and the client support a higher protocol version.

4.7 Medium

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.007 Low

EPSS

Percentile

78.0%