BlackBerry <= 7.1 and 10.x < 10.3.1.1779 SSL/TLS EXPORT_RSA Ciphers Downgrade MitM (KB36811) (FREAK)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The version of BlackBerry OS is affected by the FREAK vulnerability.

Description :

According to its version number, the BlackBerry OS installed on the
mobile device is the BlackBerry OS equal or prior to version 7.1, or
else it is the BlackBerry 10 OS prior to version 10.3.1.1779. It is,
therefore, affected by a security feature bypass vulnerability, known
as FREAK (Factoring attack on RSA-EXPORT Keys), due to the support of
weak EXPORT_RSA cipher suites with keys less than or equal to 512
bits. A man-in-the-middle attacker may be able to downgrade the
SSL/TLS connection to use EXPORT_RSA cipher suites which can be
factored in a short amount of time, allowing the attacker to intercept
and decrypt the traffic.

See also :

https://www.smacktls.com/#freak
http://www.blackberry.com/btsc/KB36811

Solution :

Upgrade to BlackBerry 10.3.1.1779 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Family: Mobile Devices

Nessus Plugin ID: 82296 ()

Bugtraq ID: 71936

CVE ID: CVE-2015-0204

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now