⚠ Actively exploited
Added to CISA KEV on 2022-05-04. Federal agencies required to patch by 2022-05-25. Required action: Apply updates per vendor instructions..
CVE-2014-0160
Severity
7.5HIGH
EPSS
94.5%
top < 0.01%
CISA KEV
KEV
Added 2022-05-04
Due 2022-05-25
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedApr 7
KEV addedMay 4
Latest updateMay 13
KEV dueMay 25
CISA Required Action: Apply updates per vendor instructions.
Description
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages23 packages
Also affects: Debian Linux 6.0, 7.0, 8.0, Fedora 19, 20, Ubuntu Linux 12.04, 12.10, 13.10, Enterprise Linux 6.5
Patches
🔴Vulnerability Details
4💥Exploits & PoCs
5Exploit-DB
▶
Exploit-DB▶
OpenSSL 1.0.1f TLS Heartbeat Extension - 'Heartbleed' Memory Disclosure (Multiple SSL/TLS Versions)↗2014-04-09
Nuclei▶
OpenSSL Heartbleed Vulnerability
🔍Detection Rules
11Suricata▶
ET EXPLOIT Possible TLS HeartBleed Unencrypted Request Method 4 (Inbound to Common SSL Port)↗2014-04-15
Suricata▶
ET EXPLOIT Possible TLS HeartBleed Unencrypted Request Method 3 (Inbound to Common SSL Port)↗2014-04-15
Suricata▶
ET EXPLOIT Possible OpenSSL HeartBleed Large HeartBeat Response from Common SSL Port (Outbound from Server)↗2014-04-11
Suricata▶
ET EXPLOIT Possible OpenSSL HeartBleed Large HeartBeat Response from Common SSL Port (Outbound from Client)↗2014-04-11