Transport Layer Security (TLS) Protocol CRIME Vulnerability

low Nessus Plugin ID 62565


The remote service has a configuration that may make it vulnerable to the CRIME attack.


The remote service has one of two configurations that are known to be required for the CRIME attack :

- SSL / TLS compression is enabled.

- TLS advertises the SPDY protocol earlier than version 4.

Note that Nessus did not attempt to launch the CRIME attack against the remote service.


Disable compression and / or the SPDY service.

See Also

Plugin Details

Severity: Low

ID: 62565

File Name: ssl_crime.nasl

Version: 1.15

Type: remote

Family: General

Published: 10/16/2012

Updated: 1/6/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 4.9


Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2012-4930

Vulnerability Information

Required KB Items: Settings/ParanoidReport, SSL/Supported

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 9/15/2012

Reference Information

CVE: CVE-2012-4929, CVE-2012-4930

BID: 55704, 55707