BlackBerry <= 7.1 and 10.x < SSL/TLS EXPORT_RSA Ciphers Downgrade MitM (KB36811) (FREAK)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.

Synopsis :

The version of BlackBerry OS is affected by the FREAK vulnerability.

Description :

According to its version number, the BlackBerry OS installed on the
mobile device is the BlackBerry OS equal or prior to version 7.1, or
else it is the BlackBerry 10 OS prior to version It is,
therefore, affected by a security feature bypass vulnerability, known
as FREAK (Factoring attack on RSA-EXPORT Keys), due to the support of
weak EXPORT_RSA cipher suites with keys less than or equal to 512
bits. A man-in-the-middle attacker may be able to downgrade the
SSL/TLS connection to use EXPORT_RSA cipher suites which can be
factored in a short amount of time, allowing the attacker to intercept
and decrypt the traffic.

See also :

Solution :

Upgrade to BlackBerry or later.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: Mobile Devices

Nessus Plugin ID: 82296 ()

Bugtraq ID: 71936

CVE ID: CVE-2015-0204

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now