CVE-2022-1434 — Use of a Broken or Risky Cryptographic Algorithm in Openssl
Severity
5.9MEDIUMNVD
OSV7.3
EPSS
0.1%
top 79.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 3
Latest updateJun 15
Description
The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being sent from one endpoint to an OpenSSL 3.0 recipient such that the modified data would still pass the MAC integrity check. Note that data sent from an OpenSSL 3.0 endpoint to a non-OpenSSL 3.0 endpoint will always be rejected by the recipient and the co…
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 2.2 | Impact: 3.6
Affected Packages5 packages
🔴Vulnerability Details
5📋Vendor Advisories
5Debian▶
CVE-2022-1434: openssl - The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the A...↗2022