Vulnerability Details : CVE-2017-6168
Public exploit exists!
On BIG-IP versions 11.6.0-11.6.2 (fixed in 11.6.2 HF1), 12.0.0-12.1.2 HF1 (fixed in 12.1.2 HF2), or 13.0.0-13.0.0 HF2 (fixed in 13.0.0 HF3) a virtual server configured with a Client SSL profile may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA, which when exploited, may result in plaintext recovery of encrypted messages and/or a Man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server's private key itself, aka a ROBOT attack.
Products affected by CVE-2017-6168
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Application Acceleration ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.2cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Acceleration ManagerVersions from including (>=) 11.6.0 and up to, including, (<=) 11.6.2cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_ltm:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_ltm:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_ltm:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_afm:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_afm:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_afm:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_apm:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_apm:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_apm:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_asm:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_asm:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_asm:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_pem:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_pem:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_pem:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:websafe:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:websafe:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:websafe:11.6.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-6168
66.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2017-6168
-
Scanner for Bleichenbacher Oracle in RSA PKCS #1 v1.5
Disclosure Date: 2009-06-17First seen: 2020-04-26auxiliary/scanner/ssl/bleichenbacher_oracleSome TLS implementations handle errors processing RSA key exchanges and encryption (PKCS #1 v1.5 messages) in a broken way that leads an adaptive chosen-chiphertext attack. Attackers cannot recover a server's private key, but they can decrypt and sign messages with i
CVSS scores for CVE-2017-6168
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
7.4
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
2.2
|
5.2
|
NIST |
CWE ids for CVE-2017-6168
-
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-6168
-
http://www.securitytracker.com/id/1039839
F5 BIG-IP RSA TLS Implementation Lets Remote Users Decrypt Data Communicated By the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.kb.cert.org/vuls/id/144389
VU#144389 - TLS implementations may disclose side channel information via discrepancies between valid and invalid PKCS#1 paddingThird Party Advisory;US Government Resource
-
https://robotattack.org/
The ROBOT Attack - Return of Bleichenbacher's Oracle ThreatTechnical Description;Third Party Advisory
-
https://support.f5.com/csp/article/K21905460
Issue Tracking;Mitigation;Vendor Advisory
-
http://www.securityfocus.com/bid/101901
Multiple F5 BIG-IP Products CVE-2017-6168 Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
Jump to