Search for vulnerabilities
Vulnerability details: VCID-6xd4-wjkk-aaak
Vulnerability ID VCID-6xd4-wjkk-aaak
Aliases CVE-2014-0224
VC-OPENSSL-20140605-CVE-2014-0224
Summary An attacker can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0224.html
rhas Important https://access.redhat.com/errata/RHSA-2014:0624
rhas Important https://access.redhat.com/errata/RHSA-2014:0625
rhas Important https://access.redhat.com/errata/RHSA-2014:0626
rhas Important https://access.redhat.com/errata/RHSA-2014:0627
rhas Important https://access.redhat.com/errata/RHSA-2014:0628
rhas Important https://access.redhat.com/errata/RHSA-2014:0629
rhas Important https://access.redhat.com/errata/RHSA-2014:0630
rhas Important https://access.redhat.com/errata/RHSA-2014:0631
rhas Important https://access.redhat.com/errata/RHSA-2014:0632
rhas Important https://access.redhat.com/errata/RHSA-2014:0633
rhas Important https://access.redhat.com/errata/RHSA-2014:0679
rhas Important https://access.redhat.com/errata/RHSA-2014:0680
epss 0.89236 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89236 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89236 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89236 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89236 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89236 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89236 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89692 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89692 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89692 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89692 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.89692 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92512 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92518 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92518 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92518 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92847 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92879 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92879 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92888 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92888 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92888 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.92888 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.93149 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.97367 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.97367 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.97367 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.97367 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
epss 0.97539 https://api.first.org/data/v1/epss?cve=CVE-2014-0224
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
generic_textual MODERATE http://seclists.org/fulldisclosure/2014/Dec/23
cvssv2 5.8 https://nvd.nist.gov/vuln/detail/CVE-2014-0224
cvssv3 7.4 https://nvd.nist.gov/vuln/detail/CVE-2014-0224
cvssv3.1 7.4 https://nvd.nist.gov/vuln/detail/CVE-2014-0224
generic_textual Medium https://ubuntu.com/security/notices/USN-2232-1
generic_textual Medium https://www.openssl.org/news/secadv_20140605.txt
cvssv3.1 9.8 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
generic_textual CRITICAL http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
cvssv3.1 9.8 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
generic_textual CRITICAL http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
cvssv3.1 8.1 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
cvssv3.1 5.3 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
generic_textual HIGH http://www.securityfocus.com/archive/1/534161/100/0/threaded
generic_textual MODERATE http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Reference id Reference type URL
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
http://ccsinjection.lepidum.co.jp
http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html
http://esupport.trendmicro.com/solution/en-US/1103813.aspx
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217
http://linux.oracle.com/errata/ELSA-2014-1053.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html
http://marc.info/?l=bugtraq&m=140266410314613&w=2
http://marc.info/?l=bugtraq&m=140317760000786&w=2
http://marc.info/?l=bugtraq&m=140369637402535&w=2
http://marc.info/?l=bugtraq&m=140386311427810&w=2
http://marc.info/?l=bugtraq&m=140389274407904&w=2
http://marc.info/?l=bugtraq&m=140389355508263&w=2
http://marc.info/?l=bugtraq&m=140431828824371&w=2
http://marc.info/?l=bugtraq&m=140448122410568&w=2
http://marc.info/?l=bugtraq&m=140482916501310&w=2
http://marc.info/?l=bugtraq&m=140491231331543&w=2
http://marc.info/?l=bugtraq&m=140499864129699&w=2
http://marc.info/?l=bugtraq&m=140544599631400&w=2
http://marc.info/?l=bugtraq&m=140604261522465&w=2
http://marc.info/?l=bugtraq&m=140621259019789&w=2
http://marc.info/?l=bugtraq&m=140672208601650&w=2
http://marc.info/?l=bugtraq&m=140752315422991&w=2
http://marc.info/?l=bugtraq&m=140784085708882&w=2
http://marc.info/?l=bugtraq&m=140794476212181&w=2
http://marc.info/?l=bugtraq&m=140852757108392&w=2
http://marc.info/?l=bugtraq&m=140852826008699&w=2
http://marc.info/?l=bugtraq&m=140870499402361&w=2
http://marc.info/?l=bugtraq&m=140904544427729&w=2
http://marc.info/?l=bugtraq&m=140983229106599&w=2
http://marc.info/?l=bugtraq&m=141025641601169&w=2
http://marc.info/?l=bugtraq&m=141147110427269&w=2
http://marc.info/?l=bugtraq&m=141164638606214&w=2
http://marc.info/?l=bugtraq&m=141383410222440&w=2
http://marc.info/?l=bugtraq&m=141383465822787&w=2
http://marc.info/?l=bugtraq&m=141658880509699&w=2
http://marc.info/?l=bugtraq&m=142350350616251&w=2
http://marc.info/?l=bugtraq&m=142546741516006&w=2
http://marc.info/?l=bugtraq&m=142805027510172&w=2
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0224.html
http://puppetlabs.com/security/cve/cve-2014-0224
http://rhn.redhat.com/errata/RHSA-2014-0624.html
http://rhn.redhat.com/errata/RHSA-2014-0626.html
http://rhn.redhat.com/errata/RHSA-2014-0627.html
http://rhn.redhat.com/errata/RHSA-2014-0630.html
http://rhn.redhat.com/errata/RHSA-2014-0631.html
http://rhn.redhat.com/errata/RHSA-2014-0632.html
http://rhn.redhat.com/errata/RHSA-2014-0633.html
http://rhn.redhat.com/errata/RHSA-2014-0680.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0224.json
https://access.redhat.com/site/blogs/766093/posts/908133
https://api.first.org/data/v1/epss?cve=CVE-2014-0224
https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues
https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1
https://bugzilla.redhat.com/show_bug.cgi?id=1103586
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
https://discussions.nessus.org/thread/7517
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/Jun/38
http://secunia.com/advisories/58128
http://secunia.com/advisories/58337
http://secunia.com/advisories/58385
http://secunia.com/advisories/58433
http://secunia.com/advisories/58492
http://secunia.com/advisories/58579
http://secunia.com/advisories/58615
http://secunia.com/advisories/58639
http://secunia.com/advisories/58660
http://secunia.com/advisories/58667
http://secunia.com/advisories/58713
http://secunia.com/advisories/58714
http://secunia.com/advisories/58716
http://secunia.com/advisories/58719
http://secunia.com/advisories/58742
http://secunia.com/advisories/58743
http://secunia.com/advisories/58745
http://secunia.com/advisories/58759
http://secunia.com/advisories/58930
http://secunia.com/advisories/58939
http://secunia.com/advisories/58945
http://secunia.com/advisories/58977
http://secunia.com/advisories/59004
http://secunia.com/advisories/59012
http://secunia.com/advisories/59040
http://secunia.com/advisories/59043
http://secunia.com/advisories/59055
http://secunia.com/advisories/59063
http://secunia.com/advisories/59093
http://secunia.com/advisories/59101
http://secunia.com/advisories/59120
http://secunia.com/advisories/59126
http://secunia.com/advisories/59132
http://secunia.com/advisories/59135
http://secunia.com/advisories/59142
http://secunia.com/advisories/59162
http://secunia.com/advisories/59163
http://secunia.com/advisories/59167
http://secunia.com/advisories/59175
http://secunia.com/advisories/59186
http://secunia.com/advisories/59188
http://secunia.com/advisories/59189
http://secunia.com/advisories/59190
http://secunia.com/advisories/59191
http://secunia.com/advisories/59192
http://secunia.com/advisories/59202
http://secunia.com/advisories/59211
http://secunia.com/advisories/59214
http://secunia.com/advisories/59215
http://secunia.com/advisories/59223
http://secunia.com/advisories/59231
http://secunia.com/advisories/59264
http://secunia.com/advisories/59282
http://secunia.com/advisories/59284
http://secunia.com/advisories/59287
http://secunia.com/advisories/59300
http://secunia.com/advisories/59301
http://secunia.com/advisories/59305
http://secunia.com/advisories/59306
http://secunia.com/advisories/59310
http://secunia.com/advisories/59325
http://secunia.com/advisories/59338
http://secunia.com/advisories/59342
http://secunia.com/advisories/59347
http://secunia.com/advisories/59354
http://secunia.com/advisories/59362
http://secunia.com/advisories/59364
http://secunia.com/advisories/59365
http://secunia.com/advisories/59368
http://secunia.com/advisories/59370
http://secunia.com/advisories/59374
http://secunia.com/advisories/59375
http://secunia.com/advisories/59380
http://secunia.com/advisories/59383
http://secunia.com/advisories/59389
http://secunia.com/advisories/59413
http://secunia.com/advisories/59429
http://secunia.com/advisories/59435
http://secunia.com/advisories/59437
http://secunia.com/advisories/59438
http://secunia.com/advisories/59440
http://secunia.com/advisories/59441
http://secunia.com/advisories/59442
http://secunia.com/advisories/59444
http://secunia.com/advisories/59445
http://secunia.com/advisories/59446
http://secunia.com/advisories/59447
http://secunia.com/advisories/59448
http://secunia.com/advisories/59449
http://secunia.com/advisories/59450
http://secunia.com/advisories/59451
http://secunia.com/advisories/59454
http://secunia.com/advisories/59459
http://secunia.com/advisories/59460
http://secunia.com/advisories/59483
http://secunia.com/advisories/59490
http://secunia.com/advisories/59491
http://secunia.com/advisories/59495
http://secunia.com/advisories/59502
http://secunia.com/advisories/59506
http://secunia.com/advisories/59514
http://secunia.com/advisories/59518
http://secunia.com/advisories/59525
http://secunia.com/advisories/59528
http://secunia.com/advisories/59529
http://secunia.com/advisories/59530
http://secunia.com/advisories/59589
http://secunia.com/advisories/59602
http://secunia.com/advisories/59655
http://secunia.com/advisories/59659
http://secunia.com/advisories/59661
http://secunia.com/advisories/59666
http://secunia.com/advisories/59669
http://secunia.com/advisories/59677
http://secunia.com/advisories/59721
http://secunia.com/advisories/59784
http://secunia.com/advisories/59824
http://secunia.com/advisories/59827
http://secunia.com/advisories/59878
http://secunia.com/advisories/59885
http://secunia.com/advisories/59894
http://secunia.com/advisories/59916
http://secunia.com/advisories/59990
http://secunia.com/advisories/60049
http://secunia.com/advisories/60066
http://secunia.com/advisories/60176
http://secunia.com/advisories/60522
http://secunia.com/advisories/60567
http://secunia.com/advisories/60571
http://secunia.com/advisories/60577
http://secunia.com/advisories/60819
http://secunia.com/advisories/61254
http://secunia.com/advisories/61815
http://security.gentoo.org/glsa/glsa-201407-05.xml
https://filezilla-project.org/versions.php?type=server
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://kb.bluecoat.com/index?page=content&id=SA80
https://kc.mcafee.com/corporate/index?page=content&id=SB10075
https://ubuntu.com/security/notices/USN-2232-1
http://support.apple.com/kb/HT6443
http://support.citrix.com/article/CTX140876
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html
https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005
https://www.ibm.com/support/docview.wss?uid=ssg1S1004670
https://www.ibm.com/support/docview.wss?uid=ssg1S1004671
https://www.imperialviolet.org/2014/06/05/earlyccs.html
https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf
https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf
https://www.novell.com/support/kb/doc.php?id=7015271
https://www.openssl.org/news/secadv/20140605.txt
https://www.openssl.org/news/secadv_20140605.txt
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
http://www-01.ibm.com/support/docview.wss?uid=isg400001841
http://www-01.ibm.com/support/docview.wss?uid=isg400001843
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690
http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506
http://www-01.ibm.com/support/docview.wss?uid=swg21673137
http://www-01.ibm.com/support/docview.wss?uid=swg21675626
http://www-01.ibm.com/support/docview.wss?uid=swg21675821
http://www-01.ibm.com/support/docview.wss?uid=swg21676035
http://www-01.ibm.com/support/docview.wss?uid=swg21676062
http://www-01.ibm.com/support/docview.wss?uid=swg21676071
http://www-01.ibm.com/support/docview.wss?uid=swg21676333
http://www-01.ibm.com/support/docview.wss?uid=swg21676334
http://www-01.ibm.com/support/docview.wss?uid=swg21676419
http://www-01.ibm.com/support/docview.wss?uid=swg21676478
http://www-01.ibm.com/support/docview.wss?uid=swg21676496
http://www-01.ibm.com/support/docview.wss?uid=swg21676501
http://www-01.ibm.com/support/docview.wss?uid=swg21676529
http://www-01.ibm.com/support/docview.wss?uid=swg21676536
http://www-01.ibm.com/support/docview.wss?uid=swg21676615
http://www-01.ibm.com/support/docview.wss?uid=swg21676644
http://www-01.ibm.com/support/docview.wss?uid=swg21676655
http://www-01.ibm.com/support/docview.wss?uid=swg21676786
http://www-01.ibm.com/support/docview.wss?uid=swg21676833
http://www-01.ibm.com/support/docview.wss?uid=swg21676845
http://www-01.ibm.com/support/docview.wss?uid=swg21676879
http://www-01.ibm.com/support/docview.wss?uid=swg21676889
http://www-01.ibm.com/support/docview.wss?uid=swg21677080
http://www-01.ibm.com/support/docview.wss?uid=swg21677131
http://www-01.ibm.com/support/docview.wss?uid=swg21677390
http://www-01.ibm.com/support/docview.wss?uid=swg21677527
http://www-01.ibm.com/support/docview.wss?uid=swg21677567
http://www-01.ibm.com/support/docview.wss?uid=swg21677695
http://www-01.ibm.com/support/docview.wss?uid=swg21677828
http://www-01.ibm.com/support/docview.wss?uid=swg21677836
http://www-01.ibm.com/support/docview.wss?uid=swg21678167
http://www-01.ibm.com/support/docview.wss?uid=swg21678233
http://www-01.ibm.com/support/docview.wss?uid=swg21678289
http://www-01.ibm.com/support/docview.wss?uid=swg21683332
http://www-01.ibm.com/support/docview.wss?uid=swg24037727
http://www-01.ibm.com/support/docview.wss?uid=swg24037729
http://www-01.ibm.com/support/docview.wss?uid=swg24037730
http://www-01.ibm.com/support/docview.wss?uid=swg24037731
http://www-01.ibm.com/support/docview.wss?uid=swg24037732
http://www-01.ibm.com/support/docview.wss?uid=swg24037761
http://www-01.ibm.com/support/docview.wss?uid=swg24037870
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
http://www.blackberry.com/btsc/KB36051
http://www.fortiguard.com/advisory/FG-IR-14-018/
http://www.f-secure.com/en/web/labs_global/fsc-2014-6
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
http://www.ibm.com/support/docview.wss?uid=isg3T1020948
http://www.ibm.com/support/docview.wss?uid=ssg1S1004678
http://www.ibm.com/support/docview.wss?uid=swg1IT02314
http://www.ibm.com/support/docview.wss?uid=swg21676356
http://www.ibm.com/support/docview.wss?uid=swg21676793
http://www.ibm.com/support/docview.wss?uid=swg21676877
http://www.ibm.com/support/docview.wss?uid=swg24037783
http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
http://www.kb.cert.org/vuls/id/978508
http://www.kerio.com/support/kerio-control/release-history
http://www.mandriva.com/security/advisories?name=MDVSA-2014:105
http://www.mandriva.com/security/advisories?name=MDVSA-2014:106
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://www.novell.com/support/kb/doc.php?id=7015264
http://www.novell.com/support/kb/doc.php?id=7015300
http://www.openssl.org/news/secadv_20140605.txt
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securitytracker.com/id/1031032
http://www.securitytracker.com/id/1031594
http://www.splunk.com/view/SP-CAAAM2D
http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download
http://www.vmware.com/security/advisories/VMSA-2014-0006.html
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
750665 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750665
cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
CVE-2014-0224 https://nvd.nist.gov/vuln/detail/CVE-2014-0224
GLSA-201407-05 https://security.gentoo.org/glsa/201407-05
RHSA-2014:0624 https://access.redhat.com/errata/RHSA-2014:0624
RHSA-2014:0625 https://access.redhat.com/errata/RHSA-2014:0625
RHSA-2014:0626 https://access.redhat.com/errata/RHSA-2014:0626
RHSA-2014:0627 https://access.redhat.com/errata/RHSA-2014:0627
RHSA-2014:0628 https://access.redhat.com/errata/RHSA-2014:0628
RHSA-2014:0629 https://access.redhat.com/errata/RHSA-2014:0629
RHSA-2014:0630 https://access.redhat.com/errata/RHSA-2014:0630
RHSA-2014:0631 https://access.redhat.com/errata/RHSA-2014:0631
RHSA-2014:0632 https://access.redhat.com/errata/RHSA-2014:0632
RHSA-2014:0633 https://access.redhat.com/errata/RHSA-2014:0633
RHSA-2014:0679 https://access.redhat.com/errata/RHSA-2014:0679
RHSA-2014:0680 https://access.redhat.com/errata/RHSA-2014:0680
USN-2232-1 https://usn.ubuntu.com/2232-1/
Data source Metasploit
Description This module checks for the OpenSSL ChangeCipherSpec (CCS) Injection vulnerability. The problem exists in the handling of early CCS messages during session negotiation. Vulnerable installations of OpenSSL accepts them, while later implementations do not. If successful, an attacker can leverage this vulnerability to perform a man-in-the-middle (MITM) attack by downgrading the cipher spec between a client and server. This issue was first reported in early June, 2014.
Note
{}
Ransomware campaign use Unknown
Source publication date June 5, 2014
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/ssl/openssl_ccs.rb
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2014-0224
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2014-0224
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2014-0224
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.99516
EPSS Score 0.89236
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.