CVE-2018-0732
high-risk
Published 2018-06-12
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
Do I need to act?
!
78.4% chance of exploitation in next 30 days
EPSS score — higher than 22% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (9)
References (74)
Third Party Advisory
http://www.securityfocus.com/bid/104442
Third Party Advisory
http://www.securitytracker.com/id/1041090
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2552
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2553
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3221
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1296
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1297
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1543
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
Third Party Advisory
https://security.gentoo.org/glsa/201811-03
Third Party Advisory
https://security.netapp.com/advisory/ntap-20181105-0001/
and 54 more references
61
/ 100
high-risk
Severity
26/34 · High
Exploitability
20/34 · Moderate
Exposure
15/34 · Moderate