Vulnerability Details : CVE-2002-20001
Potential exploit
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.
Products affected by CVE-2002-20001
- cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*
- F5 » Big-ip Local Traffic ManagerVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Global Traffic ManagerVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Security ManagerVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Access Policy ManagerVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Acceleration ManagerVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Advanced Firewall ManagerVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Policy Enforcement ManagerVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
- F5 » Big-iq Centralized ManagementVersions from including (>=) 8.0.0 and up to, including, (<=) 8.2.0cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-iq_centralized_management:7.1.0:*:*:*:*:*:*:*
- F5 » Big-ip Domain Name SystemVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*
- F5 » Big-ip Fraud Protection ServiceVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.1.0:*:*:*:*:*:*:*
- F5 » Big-ip Application Visibility And ReportingVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*
- F5 » Big-ip Advanced Web Application FirewallVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*
- F5 » Big-ip Ddos Hybrid DefenderVersions from including (>=) 13.1.0 and up to, including, (<=) 17.1.0cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*
- cpe:2.3:o:f5:f5os-a:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:f5:f5os-a:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:*
- cpe:2.3:o:f5:f5os-c:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:f5:f5os-c:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_service_proxy:1.6.0:*:*:*:*:kubernetes:*:*
- cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*
- cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*
- cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*
- cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*
- cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:stormshield:stormshield_management_center:*:*:*:*:*:*:*:*
- cpe:2.3:a:balasys:dheater:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-20001
14.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-20001
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2002-20001
-
The product does not properly control the allocation and maintenance of a limited resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2002-20001
-
https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/
Configuring Supported TLS Groups in OpenSSL - OpenSSL BlogThird Party Advisory
-
https://dheatattack.gitlab.io/
D(HE)at Attack | D(HE)at Attack
-
https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/
Server overload by enforcing DHE key exchange using minimal bandwidth : netsecIssue Tracking
-
https://github.com/mozilla/ssl-config-generator/issues/162
Stop recommending DHE, because of "dheater" vulnerability · Issue #162 · mozilla/ssl-config-generator · GitHubIssue Tracking
-
https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol
ResearchGateExploit;Technical Description
-
https://support.f5.com/csp/article/K83120834
Diffie-Hellman key agreement protocol vulnerability CVE-2002-20001Third Party Advisory
-
https://github.com/Balasys/dheater
GitHub - Balasys/dheater: D(HE)ater is a security tool can perform DoS attack by enforcing the DHE key exchange.Product
-
https://ieeexplore.ieee.org/document/10374117
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange | IEEE Journals & Magazine | IEEE Xplore
-
https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf
Third Party Advisory
-
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt
Third Party Advisory
-
https://gitlab.com/dheatattack/dheater
D(HE)at Attack / dheater · GitLab
-
https://dheatattack.com
DHEat attackThird Party Advisory
-
https://www.suse.com/support/kb/doc/?id=000020510
Security Vulnerability: DHEater aka CVE-2002-20001 | Support | SUSEThird Party Advisory
Jump to