SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened eNcryption)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote host may be affected by a vulnerability that allows a
remote attacker to potentially decrypt captured TLS traffic.

Description :

The remote host supports SSLv2 and therefore may be affected by a
vulnerability that allows a cross-protocol Bleichenbacher padding
oracle attack known as DROWN (Decrypting RSA with Obsolete and
Weakened eNcryption). This vulnerability exists due to a flaw in the
Secure Sockets Layer Version 2 (SSLv2) implementation, and it allows
captured TLS traffic to be decrypted. A man-in-the-middle attacker can
exploit this to decrypt the TLS connection by utilizing previously
captured traffic and weak cryptography along with a series of
specially crafted connections to an SSLv2 server that uses the same
private key.

See also :

https://drownattack.com/
https://drownattack.com/drown-attack-paper.pdf

Solution :

Disable SSLv2 and export grade cryptography cipher suites. Ensure that
private keys are not used anywhere with server software that supports
SSLv2 connections.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 3.8
(CVSS2#E:F/RL:ND/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 89058 ()

Bugtraq ID: 83733

CVE ID: CVE-2016-0800

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now