Search for vulnerabilities
Vulnerability details: VCID-y471-3h22-aaah
Vulnerability ID VCID-y471-3h22-aaah
Aliases CVE-2016-7055
VC-OPENSSL-20161110-CVE-2016-7055
Summary There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.
Status Published
Exploitability 0.5
Weighted Severity 7.0
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7055.html
rhas Moderate https://access.redhat.com/errata/RHSA-2018:2185
rhas Moderate https://access.redhat.com/errata/RHSA-2018:2186
rhas Moderate https://access.redhat.com/errata/RHSA-2018:2187
cvssv3 3.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7055.json
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.00868 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.07287 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.07969 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.07969 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.07969 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.07969 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.07969 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.07969 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09577 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09683 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09683 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09683 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.09683 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
epss 0.18269 https://api.first.org/data/v1/epss?cve=CVE-2016-7055
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1393929
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055
cvssv2 2.6 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 2.6 https://nvd.nist.gov/vuln/detail/CVE-2016-7055
cvssv3 5.9 https://nvd.nist.gov/vuln/detail/CVE-2016-7055
cvssv3.1 5.9 https://nvd.nist.gov/vuln/detail/CVE-2016-7055
archlinux Medium https://security.archlinux.org/AVG-154
archlinux Medium https://security.archlinux.org/AVG-155
archlinux Low https://security.archlinux.org/AVG-67
archlinux Low https://security.archlinux.org/AVG-68
generic_textual Medium https://ubuntu.com/security/notices/USN-3181-1
generic_textual Low https://www.openssl.org/news/secadv/20161110.txt
generic_textual Moderate https://www.openssl.org/news/secadv/20170126.txt
cvssv3.1 9.8 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
generic_textual LOW https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
cvssv3.1 9.8 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
generic_textual CRITICAL http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7055.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7055.json
https://api.first.org/data/v1/epss?cve=CVE-2016-7055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/openssl/openssl/commit/2a7dd548a6f5d6f7f84a89c98323b70a2822406e
https://github.com/openssl/openssl/commit/57c4b9f6a2f800b41ce2836986fe33640f6c3f8a
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc
https://security.gentoo.org/glsa/201702-07
https://ubuntu.com/security/notices/USN-3181-1
https://www.openssl.org/news/secadv/20161110.txt
https://www.openssl.org/news/secadv/20170126.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.tenable.com/security/tns-2017-04
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94242
http://www.securitytracker.com/id/1037261
1393929 https://bugzilla.redhat.com/show_bug.cgi?id=1393929
ASA-201701-36 https://security.archlinux.org/ASA-201701-36
ASA-201701-37 https://security.archlinux.org/ASA-201701-37
AVG-154 https://security.archlinux.org/AVG-154
AVG-155 https://security.archlinux.org/AVG-155
AVG-67 https://security.archlinux.org/AVG-67
AVG-68 https://security.archlinux.org/AVG-68
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
CVE-2016-7055 https://nvd.nist.gov/vuln/detail/CVE-2016-7055
RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2185
RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2186
RHSA-2018:2187 https://access.redhat.com/errata/RHSA-2018:2187
USN-3181-1 https://usn.ubuntu.com/3181-1/
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7055.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2016-7055
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-7055
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-7055
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.82827
EPSS Score 0.00868
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.