CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-12373 Cisco ASA Bleichenbacher attack on TLS Information Disclosure Vulnerability(ROBOT)

2018年1月2日 2281点热度 0人点赞 0条评论

漏洞类别:Cisco

漏洞等级:

漏洞信息

A vulnerability in the TLS protocol implementation of legacy Cisco ASA devices could allow an unauthenticated, remote attacker to access sensitive information. The vulnerability is due to improper implementation of countermeasures against the Bleichenbacher attack for cipher suites that rely on RSA for key exchange.
This vulnerability affects the listed ASA models when they are using an SSL trustpoint associated with a 2048-bit RSA key.

漏洞危害

An attacker could exploit this vulnerability by sending crafted TLS messages to the device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack.

解决方案

More information can be obtained from cisco-sa-20171212-bleichenbacher Workaround:

- Enable "crypto engine large-mod-accel" in the ASA configuration. This configuration change might reduce the maximum SSL throughput by up to 50%. This workaround is not available for the ASA 5505.
or:
- Configure "ssl encryption" to only allow cipher suites based on Diffie-Hellman key exchange (like "dhe-aes128-sha1" and "dhe-aes256-sha1"). This mitigation may have an impact on interoperability with legacy clients that might not support these ciphers.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

CSCvg97652: Cisco ASA

0daybank

标签: 暂无
最后更新:2018年1月2日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me