BlackBerry <= 7.1 and 10.x < SSL/TLS EXPORT_RSA Ciphers Downgrade MitM (KB36811) (FREAK)

Medium Nessus Plugin ID 82296


The version of BlackBerry OS is affected by the FREAK vulnerability.


According to its version number, the BlackBerry OS installed on the mobile device is the BlackBerry OS equal or prior to version 7.1, or else it is the BlackBerry 10 OS prior to version It is, therefore, affected by a security feature bypass vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys), due to the support of weak EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic.


Upgrade to BlackBerry or later.

See Also

Plugin Details

Severity: Medium

ID: 82296

File Name: blackberry_10_3_1_1779.nbin

Version: 1.58

Type: local

Published: 2015/03/27

Updated: 2020/06/12

Dependencies: 60033

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2015-0204

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:blackberry:blackberry_os

Required KB Items: mdm/dependency/unlocked

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/03/19

Vulnerability Publication Date: 2015/01/08

Reference Information

CVE: CVE-2015-0204

BID: 71936

CERT: 243585