Lucene search

K
f5F5F5:K16135
HistorySep 16, 2015 - 12:00 a.m.

K16135 : OpenSSL vulnerability CVE-2015-0205

2015-09-1600:00:00
my.f5.com
24

6.9 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.006 Low

EPSS

Percentile

76.4%

Security Advisory Description

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support. (CVE-2015-0205)

Impact

If you have enabled client certificate authentication for the BIG-IP Configuration utility, a remote attacker with a client certificate that contains a static Diffie-Hellman (DH) key may be able to authenticate successfully without a private key and gain access to the BIG-IP Configuration utility. The affected client certificate must be signed by a Certificate Authority (CA) that is trusted by the BIG-IP system. By default, the BIG-IP Configuration utility does not use client certificate authentication for access control.

6.9 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.006 Low

EPSS

Percentile

76.4%