Blue Coat ProxySG 6.5.x / 6.2.x / 5.5 OpenSSL Vulnerability (FREAK)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote device is affected by a security feature bypass
vulnerability.

Description :

The remote Blue Coat ProxySG device's self-reported SGOS version is
6.5 prior to 6.5.6.2, or version 6.2 prior to 6.2.16.3, or else any
version of 5.5. Therefore, it contains a bundled version of OpenSSL
affected by a security feature bypass vulnerability, known as FREAK
(Factoring attack on RSA-EXPORT Keys), due to the support of weak
EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A
man-in-the-middle attacker may be able to downgrade the SSL/TLS
connection to use EXPORT_RSA cipher suites which can be factored in a
short amount of time, allowing the attacker to intercept and decrypt
the traffic.

See also :

https://bto.bluecoat.com/security-advisory/sa91
https://www.smacktls.com/#freak

Solution :

Upgrade to version 6.2.16.3 / 6.5.6.2 or later

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 82663 ()

Bugtraq ID: 71936

CVE ID: CVE-2015-0204

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now