BlackBerry Enterprise Server SSL/TLS EXPORT_RSA Ciphers Downgrade MitM (KB36811) (FREAK)

medium Nessus Plugin ID 82295


The remote Windows host has an application that is affected by the FREAK vulnerability.


The version of BlackBerry Enterprise Server on the remote host is affected by a security feature bypass vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys), due to the support of weak EXPORT_RSA cipher suites with keys less than or equal to 512 bits.
A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic.


Upgrade to version 10.2 MR5 and later with Interim Security Update BES 12.1 for March 19, 2016, or to version 12.1 and later with Interim Security Update BES 10.2.5 for March 19 2016

See Also

Plugin Details

Severity: Medium

ID: 82295

File Name: blackberry_es_freak_kb36811.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 3/27/2015

Updated: 11/22/2019

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 4.5


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2015-0204

Vulnerability Information

CPE: cpe:/a:blackberry:enterprise_server

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 3/19/2015

Vulnerability Publication Date: 1/8/2015

Reference Information

CVE: CVE-2015-0204

BID: 71936

CERT: 243585