Vulnerability Details : CVE-2017-14032
ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.
Vulnerability category: BypassGain privilege
Products affected by CVE-2017-14032
- cpe:2.3:a:arm:mbed_tls:1.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.21:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.18:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.19:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.16:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.17:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:1.3.20:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:arm:mbed_tls:2.1.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-14032
0.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-14032
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.1
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST |
CWE ids for CVE-2017-14032
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-14032
-
https://bugs.debian.org/873557
#873557 - mbedtls: CVE-2017-14032: authentication bypass - Debian Bug report logsIssue Tracking;Patch;Third Party Advisory
-
https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32
Only return VERIFY_FAILED from a single point · ARMmbed/mbedtls@31458a1 · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02
mbed TLS Security Advisory 2017-02 - Tech UpdatesVendor Advisory
-
https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc
Improve behaviour on fatal errors · ARMmbed/mbedtls@d15795a · GitHubIssue Tracking;Patch;Third Party Advisory
-
http://www.debian.org/security/2017/dsa-3967
Debian -- Security Information -- DSA-3967-1 mbedtls
Jump to