ID

VAR-201712-0434


CVE

CVE-2017-13099


TITLE

TLS implementations may disclose side channel information via discrepancies between valid and invalid PKCS#1 padding

Trust: 0.8

sources: CERT/CC: VU#144389

DESCRIPTION

wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as "ROBOT.". TLS implementations may disclose side channel information via discrepancies between valid and invalid PKCS#1 padding, and may therefore be vulnerable to Bleichenbacher-style attacks. wolfSSL Contains a cryptographic vulnerability.Information may be obtained. wolfSSL is prone to an information-disclosure vulnerability. An attacker can exploit this issue to perform man-in-the-middle attacks to obtain sensitive information, and perform unauthorized actions. Successful exploits will lead to other attacks. Versions prior to wolfSSL 3.12.2 are vulnerable

Trust: 2.7

sources: NVD: CVE-2017-13099 // CERT/CC: VU#144389 // JVNDB: JVNDB-2017-011590 // BID: 102174 // VULMON: CVE-2017-13099

AFFECTED PRODUCTS

vendor:wolfsslmodel:wolfsslscope:ltversion:3.12.2

Trust: 1.8

vendor:siemensmodel:scalance w1750dscope:ltversion:8.3.0.1

Trust: 1.0

vendor:arubanetworksmodel:instantscope:ltversion:6.5.4.6

Trust: 1.0

vendor:wolfsslmodel:wolfsslscope:eqversion:3.9.8

Trust: 0.9

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:citrixmodel: - scope: - version: -

Trust: 0.8

vendor:erlangmodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:legion of the bouncy castlemodel: - scope: - version: -

Trust: 0.8

vendor:matrixsslmodel: - scope: - version: -

Trust: 0.8

vendor:micro focusmodel: - scope: - version: -

Trust: 0.8

vendor:wolfsslmodel: - scope: - version: -

Trust: 0.8

vendor:wolfsslmodel:wolfsslscope:eqversion:3.10.0a

Trust: 0.6

vendor:wolfsslmodel:wolfsslscope:eqversion:3.6.6

Trust: 0.6

vendor:wolfsslmodel:wolfsslscope:eqversion:3.10.0

Trust: 0.6

vendor:wolfsslmodel:wolfsslscope:eqversion:3.10.4

Trust: 0.6

vendor:wolfsslmodel:wolfsslscope:eqversion:3.9.10

Trust: 0.3

vendor:wolfsslmodel:wolfsslscope:eqversion:3.9.9

Trust: 0.3

vendor:siemensmodel:scalance w1750dscope:eqversion:0

Trust: 0.3

vendor:wolfsslmodel:wolfsslscope:neversion:3.12.2

Trust: 0.3

sources: CERT/CC: VU#144389 // BID: 102174 // JVNDB: JVNDB-2017-011590 // CNNVD: CNNVD-201712-574 // NVD: CVE-2017-13099

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2017-13099
value: MEDIUM

Trust: 1.8

CNNVD: CNNVD-201712-574
value: MEDIUM

Trust: 0.6

VULMON: CVE-2017-13099
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-13099
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

NVD: CVE-2017-13099
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 1.8

sources: VULMON: CVE-2017-13099 // JVNDB: JVNDB-2017-011590 // CNNVD: CNNVD-201712-574 // NVD: CVE-2017-13099

PROBLEMTYPE DATA

problemtype:CWE-203

Trust: 1.0

problemtype:CWE-310

Trust: 0.8

sources: JVNDB: JVNDB-2017-011590 // NVD: CVE-2017-13099

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-574

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201712-574

CONFIGURATIONS

sources: NVD: CVE-2017-13099

PATCH

title:Fix for handling of static RSA padding failures #1229url:https://github.com/wolfssl/wolfssl/pull/1229

Trust: 0.8

title:wolfSSL Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=77142

Trust: 0.6

title:Debian CVElist Bug Report Logs: wolfssl: CVE-2017-13099url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=56199568e08a4a88b5a4f0a0fa827165

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=aea3fcafd82c179d3a5dfa015e920864

Trust: 0.1

sources: VULMON: CVE-2017-13099 // JVNDB: JVNDB-2017-011590 // CNNVD: CNNVD-201712-574

EXTERNAL IDS

db:CERT/CCid:VU#144389

Trust: 3.6

db:NVDid:CVE-2017-13099

Trust: 2.8

db:BIDid:102174

Trust: 2.0

db:SIEMENSid:SSA-464260

Trust: 1.7

db:ICS CERTid:ICSA-18-282-02

Trust: 1.2

db:JVNid:JVNVU92438713

Trust: 0.8

db:JVNDBid:JVNDB-2017-011590

Trust: 0.8

db:CNNVDid:CNNVD-201712-574

Trust: 0.6

db:VULMONid:CVE-2017-13099

Trust: 0.1

sources: CERT/CC: VU#144389 // VULMON: CVE-2017-13099 // BID: 102174 // JVNDB: JVNDB-2017-011590 // CNNVD: CNNVD-201712-574 // NVD: CVE-2017-13099

REFERENCES

url:http://www.kb.cert.org/vuls/id/144389

Trust: 2.9

url:https://github.com/wolfssl/wolfssl/pull/1229

Trust: 2.8

url:http://www.securityfocus.com/bid/102174

Trust: 2.4

url:https://robotattack.org/

Trust: 1.7

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2018-002.txt

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-464260.pdf

Trust: 1.7

url:http://cwe.mitre.org/data/definitions/203.html

Trust: 0.9

url:https://robotattack.org

Trust: 0.8

url:https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-meyer.pdf

Trust: 0.8

url:http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf

Trust: 0.8

url:https://www.cert.org/historical/advisories/ca-1998-07.cfm

Trust: 0.8

url:https://tools.ietf.org/html/rfc5246#section-7.4.7.1

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171212-bleichenbacher

Trust: 0.8

url:https://support.citrix.com/article/ctx230238

Trust: 0.8

url:https://support.f5.com/csp/article/k21905460

Trust: 0.8

url:https://github.com/bcgit/bc-java/commit/a00b684465b38d722ca9a3543b8af8568e6bad5c

Trust: 0.8

url:https://github.com/matrixssl/matrixssl/blob/master/doc/changes.md

Trust: 0.8

url:https://support.microfocus.com/kb/doc.php?id=7022561

Trust: 0.8

url:https://community.rsa.com/docs/doc-85268

Trust: 0.8

url:https://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13099

Trust: 0.8

url:https://www.us-cert.gov/ics/advisories/icsa-18-282-02

Trust: 0.8

url:http://jvn.jp/vu/jvnvu92438713/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-13099

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-18-282-02

Trust: 0.4

url:https://www.wolfssl.com/

Trust: 0.3

url:https://nvd.nist.gov

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884235

Trust: 0.1

sources: CERT/CC: VU#144389 // VULMON: CVE-2017-13099 // BID: 102174 // JVNDB: JVNDB-2017-011590 // CNNVD: CNNVD-201712-574 // NVD: CVE-2017-13099

CREDITS

Hanno Boeck, Juraj Somorovsky of Ruhr-Universität Bochum / Hackmanit GmbH, and Craig Young of Tripwire VERT.

Trust: 0.3

sources: BID: 102174

SOURCES

db:CERT/CCid:VU#144389
db:VULMONid:CVE-2017-13099
db:BIDid:102174
db:JVNDBid:JVNDB-2017-011590
db:CNNVDid:CNNVD-201712-574
db:NVDid:CVE-2017-13099

LAST UPDATE DATE

2022-05-11T23:20:28.065000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#144389date:2018-04-09T00:00:00
db:VULMONid:CVE-2017-13099date:2019-10-09T00:00:00
db:BIDid:102174date:2018-10-10T12:00:00
db:JVNDBid:JVNDB-2017-011590date:2019-07-10T00:00:00
db:CNNVDid:CNNVD-201712-574date:2019-10-17T00:00:00
db:NVDid:CVE-2017-13099date:2019-10-09T23:23:00

SOURCES RELEASE DATE

db:CERT/CCid:VU#144389date:2017-12-12T00:00:00
db:VULMONid:CVE-2017-13099date:2017-12-13T00:00:00
db:BIDid:102174date:2017-12-12T00:00:00
db:JVNDBid:JVNDB-2017-011590date:2018-01-22T00:00:00
db:CNNVDid:CNNVD-201712-574date:2017-12-14T00:00:00
db:NVDid:CVE-2017-13099date:2017-12-13T01:29:00