Vulnerability identifier: #VU7318
Vulnerability risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-10668
CWE-ID:
CWE-696
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
OSCI-Transport Library
Universal components / Libraries /
Libraries used by multiple products
Vendor: KoSIT
Description
The vulnerability allows a remote attacker to conduct a padding oracle attack.
The weakness exists in the encryption library due to a flaw in implementation of a number of deprecated encryption algorithms (Triple DES, AES 129, AES 192, and AES 256, all in CBC mode). A remote attacker can conduct man-in-the-middle attack to analyse the CBC mode padding and decrypt the transport encryption.
Successful exploitation of the vulnerability results in decryption of the transport encryption.
Mitigation
Update to version 1.7.1.
Vulnerable software versions
OSCI-Transport Library: 1.6.1
External links
https://blog.sec-consult.com/2017/06/german-e-government-details-vulnerabilities.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.