Information disclosure in Cavium Nitrox SSL, Nitrox V SSL, and TurboSSL



Published: 2018-03-14
Risk Low
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2017-17428
CWE-ID CWE-200
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Nitrox SSL
Server applications / Server solutions for antivurus protection

Nitrox V SSL SDK
Server applications / Server solutions for antivurus protection

TurboSSL SDK
Server applications / Server solutions for antivurus protection

Cavium SDK
Server applications / Server solutions for antivurus protection

Vendor Cavium

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU11068

Risk: Low

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C]

CVE-ID: CVE-2017-17428

CWE-ID: CWE-200 - Information exposure

Exploit availability: Yes

Description

The vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information o the target system.

The weakness exists due to improper security restrictions. A remote attacker can use the Bleichenbacher attack to monitor Transport Layer Security (TLS) ciphertext data from the targeted client to the affected server and gain access to potentially sensitive information.

Mitigation

Cybersecurity is currently unaware of any solutions addressing the vulnerability.

Vulnerable software versions

Nitrox SSL: 6.0 - 6.1.0

Nitrox V SSL SDK: 1.0 - 1.2

TurboSSL SDK: 2.0 - 2.2

Cavium SDK: 1.6

CPE2.3 External links

http://www.cavium.com/security-advisory-cve-2017-17428.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###