| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.5 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, was found in OpenSSL. Affected is an unknown function of the component RSA Handler. Executing a manipulation can lead to cryptographic issue. This vulnerability appears as CVE-2015-0204. The attack may be performed from remote. There is no available exploit. You should upgrade the affected component.
Details
A vulnerability classified as critical was found in OpenSSL (Network Encryption Software). This vulnerability affects some unknown functionality of the component RSA Handler. The manipulation with an unknown input leads to a cryptographic issue vulnerability. The CWE definition for the vulnerability is CWE-310. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was presented 01/08/2015 by Karthikeyan Bhargavan with Prosecco as secadv_20150108.txt as confirmed advisory (Website). The advisory is available at openssl.org. The public release was coordinated in cooperation with the vendor. This vulnerability was named CVE-2015-0204 since 11/18/2014. The exploitation appears to be difficult. Local access is required to approach this attack. No form of authentication is required for a successful exploitation. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1600 by the MITRE ATT&CK project. The advisory points out:
An OpenSSL client will accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. A server could present a weak temporary key and downgrade the security of the session.
The vulnerability was handled as a non-public zero-day exploit for at least 78 days. During that time the estimated underground price was around $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 82820 (Oracle Java SE Multiple Vulnerabilities (April 2015 CPU) (FREAK)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 185099 (HP-UX Running OpenSSL Multiple Vulnerabilities (HPSBUX03244)).
Upgrading to version 0.9.8zd, 1.0.0p or 1.0.1k eliminates this vulnerability. A possible mitigation has been published 4 months after the disclosure of the vulnerability. The advisory contains the following remark:
The fix was developed by Stephen Henson of the OpenSSL core team.
The vulnerability is also documented in the databases at X-Force (99707), Tenable (82820), SecurityFocus (BID 71936†) and SecurityTracker (ID 1031513†). See VDB-68514, VDB-68515, VDB-68516 and VDB-68517 for similar entries. Once again VulDB remains the best source for vulnerability data.
Product
Type
Name
Version
- 0.9.8zc
- 1.0.0a
- 1.0.0b
- 1.0.0c
- 1.0.0d
- 1.0.0e
- 1.0.0f
- 1.0.0g
- 1.0.0h
- 1.0.0i
- 1.0.0j
- 1.0.0k
- 1.0.0l
- 1.0.0m
- 1.0.0n
- 1.0.0o
- 1.0.1a
- 1.0.1b
- 1.0.1c
- 1.0.1d
- 1.0.1e
- 1.0.1f
- 1.0.1g
- 1.0.1h
- 1.0.1i
- 1.0.1j
License
Support
- end of life (old version)
Website
- Product: https://www.openssl.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 8.5
VulDB Base Score: 9.8
VulDB Temp Score: 8.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cryptographic issueCWE: CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 82820
Nessus Name: Oracle Java SE Multiple Vulnerabilities (April 2015 CPU) (FREAK)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 65354
OpenVAS Name: SuSE Update for java-1_7_0-ibm SUSE-SU-2015:1086-4 (java-1_7_0-ibm)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: OpenSSL 0.9.8zd/1.0.0p/1.0.1k
Patch: github.com
Suricata ID: 2020630
Suricata Class: 🔍
Suricata Message: 🔍
Timeline
10/22/2014 🔍11/18/2014 🔍
01/08/2015 🔍
01/08/2015 🔍
01/08/2015 🔍
01/08/2015 🔍
01/09/2015 🔍
04/14/2015 🔍
04/16/2015 🔍
03/02/2022 🔍
Sources
Product: openssl.orgAdvisory: secadv_20150108.txt
Researcher: Karthikeyan Bhargavan
Organization: Prosecco
Status: Confirmed
Confirmation: 🔍
Coordinated: 🔍
CVE: CVE-2015-0204 (🔍)
GCVE (CVE): GCVE-0-2015-0204
GCVE (VulDB): GCVE-100-68518
OVAL: 🔍
X-Force: 99707 - OpenSSL RSA weak security, Low Risk
SecurityFocus: 71936 - OpenSSL CVE-2015-0204 Man in the Middle Security Bypass Vulnerability
SecurityTracker: 1031513
See also: 🔍
Entry
Created: 01/09/2015 09:45Updated: 03/02/2022 00:08
Changes: 01/09/2015 09:45 (82), 05/02/2019 17:04 (12), 03/02/2022 00:08 (3)
Complete: 🔍
Cache ID: 216:854:103
No comments yet. Languages: en.
Please log in to comment.