Vulnerability in TLS Could Allow Information Disclosure (2655992) (uncredentialed check)

Medium Nessus Plugin ID 60016


It may be possible to obtain sensitive information from the remote host with TLS-enabled services.


The remote TLS server does not verify block cipher padding when using a cipher suite that employs a block cipher such as AES and DES. The lack of padding checking can allow encrypted TLS traffic to be decrypted. This vulnerability could allow for the decryption of HTTPS traffic by an unauthorized third party.


Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

For other TLS implementations, contact the vendor for update.

See Also

Plugin Details

Severity: Medium

ID: 60016

File Name: tls_block_cipher_padding_verify.nbin

Version: $Revision: 1.74 $

Type: remote

Family: General

Published: 2012/07/18

Modified: 2018/02/15

Dependencies: 56984

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/07/10

Vulnerability Publication Date: 2012/07/10

Reference Information

CVE: CVE-2012-1870

BID: 54304

OSVDB: 83660

MSFT: MS12-049

IAVA: 2012-A-0108

MSKB: 2655992