7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.005 Low
EPSS
Percentile
77.1%
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec
protocols and other protocols and products, have a birthday bound of
approximately four billion blocks, which makes it easier for remote
attackers to obtain cleartext data via a birthday attack against a
long-duration encrypted session, as demonstrated by an HTTPS session using
Triple DES in CBC mode, aka a “Sweet32” attack.
Author | Note |
---|---|
mdeslaur | DES ciphers aren’t typically selected as there are other stronger ciphers placed earlier in default cipher lists gnutls puts AES before 3DES in the cipher list |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 17.10 | noarch | nss | < 2:3.28.4-0ubuntu1 | UNKNOWN |
ubuntu | 18.04 | noarch | nss | < 2:3.28.4-0ubuntu1 | UNKNOWN |
ubuntu | 18.10 | noarch | nss | < 2:3.28.4-0ubuntu1 | UNKNOWN |
ubuntu | 19.04 | noarch | nss | < 2:3.28.4-0ubuntu1 | UNKNOWN |
ubuntu | 14.04 | noarch | nss | < 2:3.28.4-0ubuntu0.14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | nss | < 2:3.28.4-0ubuntu0.16.04.1 | UNKNOWN |
ubuntu | 16.10 | noarch | nss | < 2:3.28.4-0ubuntu0.16.10.1 | UNKNOWN |
ubuntu | 17.04 | noarch | nss | < 2:3.28.4-0ubuntu0.17.04.1 | UNKNOWN |
ubuntu | 12.04 | noarch | openjdk-6 | < 6b41-1.13.13-0ubuntu0.12.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | openjdk-6 | < 6b41-1.13.13-0ubuntu0.14.04.1 | UNKNOWN |
hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
access.redhat.com/articles/2548661
access.redhat.com/security/cve/cve-2016-2183
blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
community.qualys.com/thread/16555
github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
launchpad.net/bugs/cve/CVE-2016-2183
nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
nvd.nist.gov/vuln/detail/CVE-2016-2183
quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
security-tracker.debian.org/tracker/CVE-2016-2183
security-tracker.debian.org/tracker/CVE-2016-2183
sweet32.info/
twitter.com/symantec/status/768786631159603200
ubuntu.com/security/notices/USN-3087-1
ubuntu.com/security/notices/USN-3179-1
ubuntu.com/security/notices/USN-3194-1
ubuntu.com/security/notices/USN-3198-1
ubuntu.com/security/notices/USN-3270-1
ubuntu.com/security/notices/USN-3372-1
www.cve.org/CVERecord?id=CVE-2016-2183
www.ietf.org/mail-archive/web/tls/current/msg04560.html
www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
www.openssl.org/blog/blog/2016/08/24/sweet32/
www.sigsac.org/ccs/CCS2016/accepted-papers/
www.suse.com/security/cve/CVE-2016-2183.html
www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.005 Low
EPSS
Percentile
77.1%