Overview
Some implementations of SSL/TLS accept export-grade (512-bit or smaller) RSA keys even when not specifically requesting export grade ciphers. An attacker able to act as a Man-in-The-Middle (MiTM) could factor weak temporary RSA keys, obtain session keys, and decrypt SSL/TLS trafflc. This issue has been dubbed the "FREAK" (Factoring Attack on RSA-EXPORT Keys) attack.
Description
CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') CWE-326: Inadequate Encryption Strength |
Impact
The weak 512-bit "export grade" RSA keys can be factored to allow an attacker to decrypt information encrypted with these keys. |
Solution
Update SSL/TLS libraries and applications |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 7.8 | AV:N/AC:L/Au:N/C:C/I:N/A:N |
Temporal | 6.4 | E:F/RL:OF/RC:C |
Environmental | 6.4 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
This vulnerability was reported by researchers from INRIA, Microsoft Research, and IMDEA.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | None |
Date Public: | 2015-03-06 |
Date First Published: | 2015-03-06 |
Date Last Updated: | 2015-10-27 02:15 UTC |
Document Revision: | 25 |