CVE-2017-17428

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Cavium Nitrox SSL, Nitrox V SSL, and TurboSSL software development kits (SDKs) allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.

References

http://www.securityfocus.com/bid/102170

http://www.securitytracker.com/id/1039984

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171212-bleichenbacher

https://www.cavium.com/security-advisory-cve-2017-17428.html

https://www.kb.cert.org/vuls/id/144389

Details

Source: MITRE

Published: 2018-03-05

Updated: 2019-10-03

Type: CWE-327

Risk Information

CVSS v2

Base Score: 7.1

Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N

Impact Score: 6.9

Exploitability Score: 8.6

Severity: HIGH

CVSS v3

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 2.2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:cavium:nitrox_ssl_sdk:*:*:*:*:*:*:*:* versions up to 6.1.0 (inclusive)

cpe:2.3:a:cavium:nitrox_v_ssl_sdk:*:*:*:*:*:*:*:* versions up to 1.2 (inclusive)

cpe:2.3:a:cavium:octeon_sdk:*:*:*:*:*:*:*:* versions up to 1.7.2 (inclusive)

cpe:2.3:a:cavium:octeon_ssl_sdk:*:*:*:*:*:*:*:* versions up to 1.5.0 (inclusive)

cpe:2.3:a:cavium:turbossl_sdk:*:*:*:*:*:*:*:* versions up to 1.0 (inclusive)

Configuration 2

OR

cpe:2.3:a:cisco:webex_conect_im:7.24.1:*:*:*:*:*:*:*

cpe:2.3:a:cisco:webex_meetings:t31:*:*:*:*:*:*:*

cpe:2.3:a:cisco:webex_meetings:t32:*:*:*:*:*:*:*

Configuration 3

AND

OR

cpe:2.3:o:cisco:ace4710_application_control_engine_firmware:3.0\(0\)a5\(2.0\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:ace4710_application_control_engine_firmware:3.0\(0\)a5\(3.0\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:ace4710_application_control_engine_firmware:3.0\(0\)a5\(3.5\):*:*:*:*:*:*:*

OR

cpe:2.3:h:cisco:ace_4710_application_control_engine:-:*:*:*:*:*:*:*

Configuration 4

AND

OR

cpe:2.3:o:cisco:ace30_application_control_engine_module_firmware:3.0\(0\)a5\(2.0\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:ace30_application_control_engine_module_firmware:3.0\(0\)a5\(3.0\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:ace30_application_control_engine_module_firmware:3.0\(0\)a5\(3.5\):*:*:*:*:*:*:*

OR

cpe:2.3:h:cisco:ace30_application_control_engine_module:-:*:*:*:*:*:*:*

Configuration 5

AND

OR

cpe:2.3:o:cisco:adaptive_security_appliance_5520_firmware:9.1\(7.16\):*:*:*:*:*:*:*

OR

cpe:2.3:h:cisco:adaptive_security_appliance_5520:-:*:*:*:*:*:*:*

Configuration 6

AND

OR

cpe:2.3:o:cisco:adaptive_security_appliance_5540_firmware:9.1\(7.16\):*:*:*:*:*:*:*

OR

cpe:2.3:h:cisco:adaptive_security_appliance_5540:-:*:*:*:*:*:*:*

Configuration 7

AND

OR

cpe:2.3:o:cisco:adaptive_security_appliance_5550_firmware:9.1\(7.16\):*:*:*:*:*:*:*

OR

cpe:2.3:h:cisco:adaptive_security_appliance_5550:-:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:o:cisco:adaptive_security_appliance_5510_firmware:9.1\(7.16\):*:*:*:*:*:*:*

OR

cpe:2.3:h:cisco:adaptive_security_appliance_5510:-:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:cisco:adaptive_security_appliance_5505_firmware:9.1\(7.16\):*:*:*:*:*:*:*

OR

cpe:2.3:h:cisco:adaptive_security_appliance_5505:-:*:*:*:*:*:*:*

Tenable Plugins

View all (1 total)

IDNameProductFamilySeverity
105415Return Of Bleichenbacher's Oracle Threat (ROBOT) Information DisclosureNessusGeneral
medium