Vulnerability Details : CVE-2016-6329
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
Vulnerability category: Information leak
Products affected by CVE-2016-6329
- cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-6329
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-6329
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2016-6329
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-6329
-
http://www.securityfocus.com/bid/92631
OpenVPN CVE-2016-6329 Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
IBM Security Bulletin: OpenSSL and OpenVPN vulnerabilities affect IBM Rational Team Concert (CVE-2016-2183, CVE-2016-6329)Third Party Advisory
-
https://community.openvpn.net/openvpn/wiki/SWEET32
SWEET32 – OpenVPN CommunityVendor Advisory
-
https://security.gentoo.org/glsa/201611-02
OpenVPN: Multiple vulnerabilities (GLSA 201611-02) — Gentoo securityThird Party Advisory
-
http://www.securitytracker.com/id/1036695
OpenVPN Blowfish Cipher Block Collision Weakness Lets Remote Users Decrypt Data in Certain Cases - SecurityTrackerThird Party Advisory;VDB Entry
-
https://sweet32.info/
Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPNTechnical Description;Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
IBM notice: The page you requested cannot be displayedThird Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
-
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
IBM Security Bulletin: IBM i is affected by several vulnerabilities (CVE-2016-2183 and CVE-2016-6329)Permissions Required;Third Party Advisory
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
HPSBGN03694 rev.1 - HPE SiteScope, Remote Disclosure of InformationThird Party Advisory
Jump to