CVE-2019-17023Improper Authentication in Mozilla Firefox

Severity
6.5MEDIUMNVD
EPSS
0.9%
top 24.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 8
Latest updateMay 24

Description

After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages7 packages

debiandebian/firefox< firefox 72.0-1 (sid)
NVDmozilla/firefox< 72.0
CVEListV5mozilla/firefoxbefore 72
mozillamozilla/firefox
debiandebian/nss< firefox 72.0-1 (sid)

Also affects: Debian Linux 10.0, Ubuntu Linux 16.04, 18.04, 19.04, 19.10, 20.04

🔴Vulnerability Details

3
GHSA
GHSA-86rq-87v9-7ppc: After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 12022-05-24
OSV
nss vulnerabilities2020-06-16
OSV
CVE-2019-17023: After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 12020-01-08

📋Vendor Advisories

5
Ubuntu
NSS vulnerabilities2020-06-16
Ubuntu
Firefox vulnerabilities2020-01-09
Red Hat
nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state2020-01-08
Debian
CVE-2019-17023: firefox - After a HelloRetryRequest has been sent, the client may negotiate a lower protoc...2019
Mozilla
Mozilla Foundation Security Advisory 2020-01: CVE-2019-17023

💬Community

1
Bugzilla
CVE-2019-17023 nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state2020-01-15