Guest

Preview Tool

Cisco Bug: CSCus15446 - Cisco SA520 Deterministic TLS Public Key Vulnerability

Last Modified

Jan 27, 2017

Products (4)

  • Cisco Small Business SA500 Series Security Appliances
  • Cisco SA520 Security Appliance
  • Cisco SA540 Security Appliance
  • Cisco SA520W Security Appliance

Known Affected Releases

2.2.0.7

Description (partial)

Symptoms:
A vulnerability in the HTTPS session key exchange process of the Cisco SA520 Security Appliance could allow an unauthenticated, remote attacker
to to obtain the key pair used in the TLS session from the affected device..

The vulnerability is due to insufficient sources of entropy used by the random number generator. An attacker could exploit this vulnerability by
gathering large amounts of TLS handshake data to predict the random numbers generated for the key pair. An exploit could allow the attacker to
decrypt session data between a host and the affected device.

Conditions:
Device running a default configuration with an affected version of software.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.