### [CVE-2014-3511](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue. ### POC #### Reference - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Ypnose/ahrf - https://github.com/chnzzh/OpenSSL-CVE-lib - https://github.com/jumanjihouse/oval - https://github.com/jumanjihouse/wormhole