CVE-2011-3389 — BEAST: Inadequate Encryption Strength in TLS 1.0
Severity
4.3MEDIUMNVD
EPSS
3.8%
top 11.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 6
Latest updateMay 13
Description
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverl…
CVSS vector
AV:N/AC:M/C:P/I:N/A:NExploitability: 8.6 | Impact: 2.9
Affected Packages10 packages
Also affects: Debian Linux 5.0, 6.0, Ubuntu Linux 10.04, 10.10, 11.04, 11.10, Enterprise Linux 6.2
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-rhch-pcq2-7gp3: The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and o↗2022-05-13
CVEList▶
CVE-2011-3389: The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and o↗2011-09-06
OSV▶
CVE-2011-3389: The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and o↗2011-09-06
💥Exploits & PoCs
1📋Vendor Advisories
4💬Community
6Bugzilla▶
[RFE] Allow override of TLS ciphers to avoid clients connecting and being vulnerable to CVE-2011-3389↗2016-10-21
Bugzilla
▶