CVE-2017-13098

CWE-203CWE-30010 documents7 sources
Severity
5.9MEDIUM
EPSS
66.2%
top 1.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 13
Latest updateMay 13

Description

BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as "ROBOT."

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

Patches

🔴Vulnerability Details

4
GHSA
Observable Discrepancy in BouncyCastle2022-05-13
OSV
Observable Discrepancy in BouncyCastle2022-05-13
OSV
CVE-2017-13098: BouncyCastle TLS prior to version 12017-12-13
CVEList
BouncyCastle JCE TLS Bleichenbacher/ROBOT2017-12-13

📋Vendor Advisories

2
Red Hat
bouncycastle: TLS server vulnerable to Adaptive Chosen Ciphertext attack when using JCE allowing plaintext recovery or MITM attack2017-12-12
Debian
CVE-2017-13098: bouncycastle - BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cr...2017

💬Community

3
Bugzilla
CVE-2017-13098 bouncycastle: TLS server vulnerable to Adaptive Chosen Ciphertext attack when using JCE allowing plaintext recovery or MITM attack2017-12-13
Bugzilla
CVE-2017-13098 bouncycastle: TLS server vulnerable to Adaptive Chosen Ciphertext attack when using JCE allowing plaintext recovery or MITM attack [fedora-all]2017-12-13
Bugzilla
CVE-2017-14919 nodejs: DoS via specific windowBits value2017-11-22
CVE-2017-13098 (MEDIUM CVSS 5.9) | BouncyCastle TLS prior to version 1 | cvebase.io