### [CVE-2017-13098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13098) ![](https://img.shields.io/static/v1?label=Product&message=BouncyCastle%20TLS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-203&color=brighgreen) ### Description BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as "ROBOT." ### POC #### Reference - http://www.kb.cert.org/vuls/id/144389 - https://robotattack.org/ - https://www.oracle.com/security-alerts/cpuoct2020.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter - https://github.com/IkerSaint/VULNAPP-vulnerable-app - https://github.com/LibHunter/LibHunter - https://github.com/dotanuki-labs/android-oss-cves-research - https://github.com/pctF/vulnerable-app