Lucene search

K
vulnrichmentWolfSSLVULNRICHMENT:CVE-2024-5814
HistoryAug 27, 2024 - 6:38 p.m.

CVE-2024-5814 Unverifed Ciphersuite used on a client-side TLS1.3 Downgrade

2024-08-2718:38:08
wolfSSL
github.com
1
cve-2024
unverified ciphersuite
tls1.3
tls1.2
server hello

CVSS4

5.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

ACTIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N/AU:Y/U:Green/V:D/RE:M

AI Score

6.4

Confidence

High

EPSS

0

Percentile

9.5%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:wolfssl:wolfssl:-:*:*:*:*:*:*:*"
    ],
    "vendor": "wolfssl",
    "product": "wolfssl",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "5.70"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

5.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

ACTIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N/AU:Y/U:Green/V:D/RE:M

AI Score

6.4

Confidence

High

EPSS

0

Percentile

9.5%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial