Blue Coat ProxySG 6.5.x / 6.2.x / 5.5 OpenSSL Vulnerability (FREAK)

Medium Nessus Plugin ID 82663

Synopsis

The remote device is affected by a security feature bypass vulnerability.

Description

The remote Blue Coat ProxySG device's self-reported SGOS version is 6.5 prior to 6.5.6.2, or version 6.2 prior to 6.2.16.3, or else any version of 5.5. Therefore, it contains a bundled version of OpenSSL affected by a security feature bypass vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys), due to the support of weak EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic.

Solution

Upgrade to version 6.2.16.3 / 6.5.6.2 or later

See Also

https://bto.bluecoat.com/security-advisory/sa91

https://www.smacktls.com/#freak

Plugin Details

Severity: Medium

ID: 82663

File Name: bluecoat_proxy_sg_6_5_6_2.nasl

Version: 1.8

Type: local

Family: Firewalls

Published: 2015/04/09

Updated: 2018/06/27

Dependencies: 68992

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:bluecoat:sgos

Required KB Items: Host/BlueCoat/ProxySG/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/03/18

Vulnerability Publication Date: 2015/01/06

Reference Information

CVE: CVE-2015-0204

BID: 71936

CERT: 243585