CVE-2019-11323Use of a Broken or Risky Cryptographic Algorithm in Haproxy

Severity
5.9MEDIUMNVD
EPSS
0.0%
top 99.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 9
Latest updateMay 24

Description

HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use of uninitialized, and very predictable, HMAC keys. This is related to an include/types/ssl_sock.h error.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages2 packages

NVDhaproxy/haproxy1.9.21.9.7

🔴Vulnerability Details

1
GHSA
GHSA-45jj-f42x-jm68: HAProxy before 12022-05-24

📋Vendor Advisories

2
Red Hat
haproxy: weak HMAC keys used to TLS session resumption after reload with rotated keys2019-04-14
Debian
CVE-2019-11323: haproxy - HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use o...2019

💬Community

2
Bugzilla
CVE-2019-11323 haproxy: weak HMAC keys used to TLS session resumption after reload with rotated keys2019-05-13
Bugzilla
CVE-2019-11323 haproxy: rotated key information disclosure [fedora-all]2019-05-13
CVE-2019-11323 — Haproxy vulnerability | cvebase