Lucene search

K
f5F5F5:K23196136
HistoryMar 02, 2016 - 12:00 a.m.

K23196136 : OpenSSL vulnerability CVE-2016-0800

2016-03-0200:00:00
my.f5.com
30

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.952 High

EPSS

Percentile

99.2%

Security Advisory Description

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a “DROWN” attack. (CVE-2016-0800)
Impact
ARX/WebSafe/FirePass/Traffix SDC
There is no impact. These F5 products are not vulnerable to this vulnerability.
BIG-IP/BIG-IQ/Enterprise Manager/LineRate
The DROWN attack issue is exposed when the SSLv2 protocol is available for use along with TLS. In the default configuration, the BIG-IP/BIG-IQ/Enterprise Manager/LineRate systems are not vulnerable to this issue. F5 recommends that you do not use the SSLv2 protocol, and it is not enabled in the BIG-IP/BIG-IQ/Enterprise Manager/LineRate default configuration. Configurations that manually enable SSLv2 expose this vulnerability.

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.952 High

EPSS

Percentile

99.2%