First published: Wed Sep 09 2020(Updated: )
The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | >=1.0.2<=1.0.2v | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =9.0 | |
Oracle Jd Edwards World Security | =a9.4 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.56 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.57 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.58 | |
Oracle Ethernet Switch Es2-64 Firmware | =2.0.0.14 | |
Oracle Ethernet Switch Es2-64 | ||
Oracle Ethernet Switch Es2-72 Firmware | =2.0.0.14 | |
Oracle Ethernet Switch Es2-72 | ||
Fujitsu M10-1 Firmware | <xcp2400 | |
Fujitsu M10-1 | ||
Fujitsu M10-4 Firmware | <xcp2400 | |
Fujitsu M10-4 | ||
Fujitsu M10-4s Firmware | <xcp2400 | |
Fujitsu M10-4s | ||
Fujitsu M12-1 Firmware | <xcp2400 | |
Fujitsu M12-1 | ||
Fujitsu M12-2 Firmware | <xcp2400 | |
Fujitsu M12-2 | ||
Fujitsu M12-2s Firmware | <xcp2400 | |
Fujitsu M12-2s | ||
Fujitsu M10-1 Firmware | <xcp3100 | |
Fujitsu M10-4 Firmware | <xcp3100 | |
Fujitsu M10-4s Firmware | <xcp3100 | |
Fujitsu M12-1 Firmware | <xcp3100 | |
Fujitsu M12-2 Firmware | <xcp3100 | |
Fujitsu M12-2s Firmware | <xcp3100 | |
Oracle Ethernet Switch Es1-24 Firmware | =1.3.1 | |
Oracle Ethernet Switch Es1-24 | ||
Oracle Ethernet Switch Tor-72 Firmware | =1.2.2 | |
Oracle Ethernet Switch Tor-72 | ||
All of | ||
Oracle Ethernet Switch Es2-64 Firmware | =2.0.0.14 | |
Oracle Ethernet Switch Es2-64 | ||
All of | ||
Oracle Ethernet Switch Es2-72 Firmware | =2.0.0.14 | |
Oracle Ethernet Switch Es2-72 | ||
All of | ||
Fujitsu M10-1 Firmware | <xcp2400 | |
Fujitsu M10-1 | ||
All of | ||
Fujitsu M10-4 Firmware | <xcp2400 | |
Fujitsu M10-4 | ||
All of | ||
Fujitsu M10-4s Firmware | <xcp2400 | |
Fujitsu M10-4s | ||
All of | ||
Fujitsu M12-1 Firmware | <xcp2400 | |
Fujitsu M12-1 | ||
All of | ||
Fujitsu M12-2 Firmware | <xcp2400 | |
Fujitsu M12-2 | ||
All of | ||
Fujitsu M12-2s Firmware | <xcp2400 | |
Fujitsu M12-2s | ||
All of | ||
Fujitsu M10-1 Firmware | <xcp3100 | |
Fujitsu M10-1 | ||
All of | ||
Fujitsu M10-4 Firmware | <xcp3100 | |
Fujitsu M10-4 | ||
All of | ||
Fujitsu M10-4s Firmware | <xcp3100 | |
Fujitsu M10-4s | ||
All of | ||
Fujitsu M12-1 Firmware | <xcp3100 | |
Fujitsu M12-1 | ||
All of | ||
Fujitsu M12-2 Firmware | <xcp3100 | |
Fujitsu M12-2 | ||
All of | ||
Fujitsu M12-2s Firmware | <xcp3100 | |
Fujitsu M12-2s | ||
All of | ||
Oracle Ethernet Switch Es1-24 Firmware | =1.3.1 | |
Oracle Ethernet Switch Es1-24 | ||
All of | ||
Oracle Ethernet Switch Tor-72 Firmware | =1.2.2 | |
Oracle Ethernet Switch Tor-72 | ||
ubuntu/openssl | <1.0.2 | 1.0.2 |
ubuntu/openssl1.0 | <1.0.2 | 1.0.2 |
debian/openssl | 1.1.1n-0+deb10u3 1.1.1n-0+deb10u6 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.11-1~deb12u2 3.2.1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1968 is a vulnerability that exploits a flaw in the TLS specification, allowing an attacker to compute the pre-master secret in connections using a Diffie-Hellman based cipher suite.
The severity of CVE-2020-1968 is medium, with a severity value of 3.7.
CVE-2020-1968 affects OpenSSL versions up to but excluding 1.0.2 and 1.1.1n-0+deb10u3, 1.1.1n-0+deb10u6, 1.1.1w-0+deb11u1, 1.1.1n-0+deb11u5, 3.0.11-1~deb12u1, 3.0.11-1~deb12u2, 3.0.11-1, 3.0.12-1.
To fix CVE-2020-1968, you should update your OpenSSL software to a version that includes the security patch.
You can find more information about CVE-2020-1968 on the official OpenSSL website and the provided references.