TLS ROBOT Vulnerability Detected port 443/tcp over SSL Active
4 TLS ROBOT Vulnerability Detected port 443/tcp over SSL Active
QID: 38695
Category: General remote services
CVE ID: CVE-2017-6168, CVE-2017-17382, CVE-2017-17427, CVE-2017-17428, CVE-2017-12373,
CVE-2017-13098, CVE-2017-1000385, CVE-2017-13099, CVE-2016-6883, CVE-2012-5081
Vendor Reference: ROBOT
Bugtraq ID: 101901, 102197, 102170, 102195, 102174, 102199, 102173, 56071, 99872, 91488, 99848
Service Modified: 01/10/2018
User Modified: -
Edited: No
PCI Vuln: Yes
Ticket State:
First Detected: 08/04/2019 at 07:10:23 (GMT+0100)
Last Detected: 09/08/2019 at 07:11:25 (GMT+0100)
Times Detected: 4
Last Fixed: 08/25/2019 at 07:11:49 (GMT+0100)
THREAT:
The TLS vulnerability is also known as Return of Bleichenbacher's Oracle Threat (ROBOT). ROBOT allows an attacker to obtain the RSA key
necessary
to decrypt TLS traffic under certain conditions.
IMPACT:
An attacker could exploit this vulnerability by sending crafted TLS messages to the device, which would act as an oracle and allow the attacker
to carry out a chosen-ciphertext attack.
SOLUTION:
High Severity Report page 3
For updates refer to the robot advisory ROBOT (https://robotattack.org/)
Patch:
Following are links for downloading patches to fix the vulnerabilities:
ROBOT (https://robotattack.org/)
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
Metasploit
Reference: CVE-2017-6168
Description: Scanner for
Vulnerability issues : 4 TLS ROBOT Vulnerability Detected port 443/tcp over SSL Active
SMA100 is safe for this vulnerability, if “Enforce Forward Secrecy” is enabled on the device. RSA encryption will be removed from the cipher suites.