Files
CVEs-PoC/2017/CVE-2017-6168.md
T
2024-06-18 02:51:15 +02:00

21 lines
1.1 KiB
Markdown

### [CVE-2017-6168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6168)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
On BIG-IP versions 11.6.0-11.6.2 (fixed in 11.6.2 HF1), 12.0.0-12.1.2 HF1 (fixed in 12.1.2 HF2), or 13.0.0-13.0.0 HF2 (fixed in 13.0.0 HF3) a virtual server configured with a Client SSL profile may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA, which when exploited, may result in plaintext recovery of encrypted messages and/or a Man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server's private key itself, aka a ROBOT attack.
### POC
#### Reference
- https://robotattack.org/
- https://www.kb.cert.org/vuls/id/144389
#### Github
- https://github.com/F5Networks/f5-openstack-hot
- https://github.com/Rakeshsivagouni/joomla
- https://github.com/fbchan/f5-openstack-hot