{"id": "CVE-2020-1968", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 3.7, "attackVector": "NETWORK", "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 2.2}]}, "published": "2020-09-09T14:15:12.507", "references": [{"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00016.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "openssl-security@openssl.org"}, {"url": "https://security.gentoo.org/glsa/202210-02", "tags": ["Third Party Advisory"], "source": "openssl-security@openssl.org"}, {"url": "https://security.netapp.com/advisory/ntap-20200911-0004/", "tags": ["Third Party Advisory"], "source": "openssl-security@openssl.org"}, {"url": "https://usn.ubuntu.com/4504-1/", "tags": ["Third Party Advisory"], "source": "openssl-security@openssl.org"}, {"url": "https://www.openssl.org/news/secadv/20200909.txt", "tags": ["Vendor Advisory"], "source": "openssl-security@openssl.org"}, {"url": "https://www.oracle.com//security-alerts/cpujul2021.html", "tags": ["Patch", "Third Party Advisory"], "source": "openssl-security@openssl.org"}, {"url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "tags": ["Patch", "Third Party Advisory"], "source": "openssl-security@openssl.org"}, {"url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "tags": ["Patch", "Third Party Advisory"], "source": "openssl-security@openssl.org"}, {"url": "https://www.oracle.com/security-alerts/cpujan2021.html", "tags": ["Third Party Advisory"], "source": "openssl-security@openssl.org"}, {"url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "tags": ["Patch", "Third Party Advisory"], "source": "openssl-security@openssl.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-203"}]}], "descriptions": [{"lang": "en", "value": "The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v)."}, {"lang": "es", "value": "El ataque Raccoon explota un fallo en la especificaci\u00f3n TLS que puede conllevar a que un atacante sea capaz de calcular el secreto pre-master en conexiones que han usado un conjunto de cifrado basado en Diffie-Hellman (DH). En tal caso, esto har\u00eda que el atacante pudiera espiar todas las comunicaciones cifradas enviadas por medio de esa conexi\u00f3n TLS. El ataque solo puede ser explotado si una implementaci\u00f3n reutiliza un secreto de DH en varias conexiones TLS. Tome en cuenta que este problema solo afecta a los conjuntos de cifrado DH y no a los conjuntos de cifrado ECDH. Este problema afecta a OpenSSL versi\u00f3n 1.0.2, que no es compatible y ya no recibe actualizaciones p\u00fablicas. OpenSSL versi\u00f3n 1.1.1 no es vulnerable a este problema. Corregido en OpenSSL versi\u00f3n 1.0.2w (Afectadas versiones 1.0.2-1.0.2v)."}], "lastModified": "2022-11-21T19:48:16.117", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A05055C5-49F7-4B9F-B2DC-D192296C41F0", "versionEndIncluding": "1.0.2v", "versionStartIncluding": "1.0.2"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B1CAD50-749F-4ADB-A046-BF3585677A58"}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0A735B4-4F3C-416B-8C08-9CB21BAD2889"}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E1E416B-920B-49A0-9523-382898C2979D"}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:oracle:ethernet_switch_es2-64_firmware:2.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B0403A9-E552-48CA-9CD5-31B48684FF70"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:oracle:ethernet_switch_es2-64:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D4AB93AB-A30F-40AE-8246-10036FF077FE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:oracle:ethernet_switch_es2-72_firmware:2.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F58DF8F-5478-4E00-BF9D-14BA3B79DA99"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:oracle:ethernet_switch_es2-72:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0D4E5146-C8E3-40D2-93D9-F9E85768A5B4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C3CF24D-2DE4-4E3B-B36E-D952D0E65E0B", "versionEndExcluding": "xcp2400"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "983D27DE-BC89-454E-AE47-95A26A3651E2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F742415-8605-4B83-9410-BDA07BABF740", "versionEndExcluding": "xcp2400"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5825AEE1-B668-40BD-86A9-2799430C742C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E9ED009-8D47-430C-9F59-EE09ECF2299E", "versionEndExcluding": "xcp2400"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3DA2D526-BDCF-4A65-914A-B3BA3A0CD613"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AB0DC35-F821-49BA-A5F1-45DD086915B0", "versionEndExcluding": "xcp2400"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EE0CF40B-E5BD-4558-9321-184D58EF621D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DF75FC1-C88D-45DA-BBD0-7EB0B9EED343", "versionEndExcluding": "xcp2400"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0F3C9C09-7B2B-4DB6-8BE0-35302ED35776"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9762A1D1-ED90-4E9C-B672-2499ABA48C46", "versionEndExcluding": "xcp2400"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "95503CE5-1D06-4092-A60D-D310AADCAFB1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D2AB72D-52FB-4D23-95FD-D10958F8B936", "versionEndExcluding": "xcp3100"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "983D27DE-BC89-454E-AE47-95A26A3651E2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1198FC6-A33A-4F4D-9643-51DEE8D46E17", "versionEndExcluding": "xcp3100"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5825AEE1-B668-40BD-86A9-2799430C742C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12F2A182-B9A0-4011-9791-435C5709E313", "versionEndExcluding": "xcp3100"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3DA2D526-BDCF-4A65-914A-B3BA3A0CD613"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B037D0E6-B857-4539-ADDC-FE2ADC2B0C2F", "versionEndExcluding": "xcp3100"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EE0CF40B-E5BD-4558-9321-184D58EF621D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "968A6DC3-9E0B-4FBD-8AAB-2ECD8CE47D23", "versionEndExcluding": "xcp3100"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0F3C9C09-7B2B-4DB6-8BE0-35302ED35776"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C219921D-966D-4EAC-A129-9D4BFE6FCD36", "versionEndExcluding": "xcp3100"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "95503CE5-1D06-4092-A60D-D310AADCAFB1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:oracle:ethernet_switch_es1-24_firmware:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDA6CD79-6D03-44C6-BA41-F190E5037EF3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:oracle:ethernet_switch_es1-24:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "62136C7B-992F-4889-9394-B233533636E3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:oracle:ethernet_switch_tor-72_firmware:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCDF5167-832D-4483-AD01-6534111196FB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:oracle:ethernet_switch_tor-72:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "03657F1F-618B-479D-AD29-BB58AF1A3819"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "openssl-security@openssl.org"}