SMA100: TLS ROBOT Vulnerability Detected port 443/tcp over SSL Active

Description

TLS ROBOT Vulnerability Detected port 443/tcp over SSL Active

4 TLS ROBOT Vulnerability Detected port 443/tcp over SSL Active
QID: 38695
Category: General remote services
CVE ID: CVE-2017-6168, CVE-2017-17382, CVE-2017-17427, CVE-2017-17428, CVE-2017-12373,
CVE-2017-13098, CVE-2017-1000385, CVE-2017-13099, CVE-2016-6883, CVE-2012-5081
Vendor Reference: ROBOT
Bugtraq ID: 101901, 102197, 102170, 102195, 102174, 102199, 102173, 56071, 99872, 91488, 99848
Service Modified: 01/10/2018
User Modified: -
Edited: No
PCI Vuln: Yes
Ticket State:
First Detected: 08/04/2019 at 07:10:23 (GMT+0100)
Last Detected: 09/08/2019 at 07:11:25 (GMT+0100)
Times Detected: 4
Last Fixed: 08/25/2019 at 07:11:49 (GMT+0100)


THREAT:
The TLS vulnerability is also known as Return of Bleichenbacher's Oracle Threat (ROBOT). ROBOT allows an attacker to obtain the RSA key
necessary
to decrypt TLS traffic under certain conditions.

IMPACT:
An attacker could exploit this vulnerability by sending crafted TLS messages to the device, which would act as an oracle and allow the attacker
to carry out a chosen-ciphertext attack.

SOLUTION:
High Severity Report page 3
For updates refer to the robot advisory ROBOT (https://robotattack.org/)
Patch:
Following are links for downloading patches to fix the vulnerabilities:
ROBOT (https://robotattack.org/)


COMPLIANCE:
Not Applicable


EXPLOITABILITY:
Metasploit
Reference: CVE-2017-6168
Description: Scanner for

Cause

Vulnerability issues : 4 TLS ROBOT Vulnerability Detected port 443/tcp over SSL Active

Resolution

SMA100 is safe for this vulnerability, if “Enforce Forward Secrecy” is enabled on the device. RSA encryption will be removed from the cipher suites.

Related Articles

  • SMA100 End of Support No-Charge Replacement FAQ
    Read More
  • SMA1000: Post upgrade to 12.5.0 on AWS and Azure, we show the error Could not retrieve the DNS settings once we log in to AMC/CMS console
    Read More
  • Firmware version required to upgrade to version 12.5.0.
    Read More
not finding your answers?