CVE-2017-13099

wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as "ROBOT."
References
Link Resource
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-002.txt Third Party Advisory
http://www.kb.cert.org/vuls/id/144389 Issue Tracking Mitigation Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/102174 Issue Tracking Mitigation Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-464260.pdf Third Party Advisory
https://github.com/wolfSSL/wolfssl/pull/1229 Issue Tracking Patch Third Party Advisory
https://robotattack.org/ Issue Tracking Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-002.txt Third Party Advisory
http://www.kb.cert.org/vuls/id/144389 Issue Tracking Mitigation Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/102174 Issue Tracking Mitigation Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-464260.pdf Third Party Advisory
https://github.com/wolfSSL/wolfssl/pull/1229 Issue Tracking Patch Third Party Advisory
https://robotattack.org/ Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:arubanetworks:instant:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:10

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 5.9
v2 : 4.3
v3 : 7.5
References () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-002.txt - Third Party Advisory () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-002.txt - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/144389 - Issue Tracking, Mitigation, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/144389 - Issue Tracking, Mitigation, Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/102174 - Issue Tracking, Mitigation, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/102174 - Issue Tracking, Mitigation, Third Party Advisory, VDB Entry
References () https://cert-portal.siemens.com/productcert/pdf/ssa-464260.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-464260.pdf - Third Party Advisory
References () https://github.com/wolfSSL/wolfssl/pull/1229 - Issue Tracking, Patch, Third Party Advisory () https://github.com/wolfSSL/wolfssl/pull/1229 - Issue Tracking, Patch, Third Party Advisory
References () https://robotattack.org/ - Issue Tracking, Third Party Advisory () https://robotattack.org/ - Issue Tracking, Third Party Advisory

Information

Published : 2017-12-13 01:29

Updated : 2024-11-21 03:10


NVD link : CVE-2017-13099

Mitre link : CVE-2017-13099

CVE.ORG link : CVE-2017-13099


JSON object : View

Products Affected

arubanetworks

  • instant

wolfssl

  • wolfssl

siemens

  • scalance_w1750d
  • scalance_w1750d_firmware
CWE
CWE-203

Observable Discrepancy