Use of a Broken or Risky Cryptographic Algorithm
Affecting gnutls package, versions <3.6.14-r0
Report new vulnerabilities
Do your applications use this vulnerable package?
Test your applications
Overview
Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm. GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.
Remediation
Upgrade gnutls
to version or higher.
References
CVSS Score
7.4
high severity
-
Attack VectorNetwork
-
Attack ComplexityHigh
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityHigh
-
AvailabilityNone
- CVE
- CVE-2020-13777
- CWE
- CWE-327
- Snyk ID
- SNYK-ALPINE39-GNUTLS-589049
- Disclosed
- 04 Jun, 2020
- Published
- 21 Jul, 2020