OpenSSL AES-NI Padding Oracle MitM Information Disclosure

medium Nessus Plugin ID 91572

Synopsis

It was possible to obtain sensitive information from the remote host with TLS-enabled services.

Description

The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability due to an error in the implementation of ciphersuites that use AES in CBC mode with HMAC-SHA1 or HMAC-SHA256.
The implementation is specially written to use the AES acceleration available in x86/amd64 processors (AES-NI). The error messages returned by the server allow allow a man-in-the-middle attacker to conduct a padding oracle attack, resulting in the ability to decrypt network traffic.

Solution

Upgrade to OpenSSL version 1.0.1t / 1.0.2h or later.

See Also

https://blog.filippo.io/luckyminus20/

http://www.nessus.org/u?7647e9f0

https://www.openssl.org/news/secadv/20160503.txt

Plugin Details

Severity: Medium

ID: 91572

File Name: openssl_AES_NI_padding_oracle.nasl

Version: 1.19

Type: remote

Family: General

Published: 6/13/2016

Updated: 8/17/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2016-2107

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/3/2016

Vulnerability Publication Date: 5/3/2016

Reference Information

CVE: CVE-2016-2107

BID: 89760