Lucene search

K
f5F5F5:K93600123
HistoryMay 07, 2016 - 12:00 a.m.

K93600123 : OpenSSL vulnerability CVE-2016-2107

2016-05-0700:00:00
my.f5.com
50

7.5 High

AI Score

Confidence

Low

0.967 High

EPSS

Percentile

99.7%

Security Advisory Description

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session, NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169. (CVE-2016-2107)
Impact
A successful attack allows traffic to be decrypted by a man in the middle (MITM) when the connection uses an AES CBC cipher on systems with CPU support for Advanced Encryption Standard New Instructions (AES-NI).