CWE
203
Advisory Published
Updated

CVE-2020-1968

First published: Wed Sep 09 2020(Updated: )

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).

Credit: openssl-security@openssl.org openssl-security@openssl.org

Affected SoftwareAffected VersionHow to fix
OpenSSL OpenSSL>=1.0.2<=1.0.2v
Canonical Ubuntu Linux=16.04
Canonical Ubuntu Linux=18.04
Debian Debian Linux=9.0
Oracle Jd Edwards World Security=a9.4
Oracle PeopleSoft Enterprise PeopleTools=8.56
Oracle PeopleSoft Enterprise PeopleTools=8.57
Oracle PeopleSoft Enterprise PeopleTools=8.58
Oracle Ethernet Switch Es2-64 Firmware=2.0.0.14
Oracle Ethernet Switch Es2-64
Oracle Ethernet Switch Es2-72 Firmware=2.0.0.14
Oracle Ethernet Switch Es2-72
Fujitsu M10-1 Firmware<xcp2400
Fujitsu M10-1
Fujitsu M10-4 Firmware<xcp2400
Fujitsu M10-4
Fujitsu M10-4s Firmware<xcp2400
Fujitsu M10-4s
Fujitsu M12-1 Firmware<xcp2400
Fujitsu M12-1
Fujitsu M12-2 Firmware<xcp2400
Fujitsu M12-2
Fujitsu M12-2s Firmware<xcp2400
Fujitsu M12-2s
Fujitsu M10-1 Firmware<xcp3100
Fujitsu M10-4 Firmware<xcp3100
Fujitsu M10-4s Firmware<xcp3100
Fujitsu M12-1 Firmware<xcp3100
Fujitsu M12-2 Firmware<xcp3100
Fujitsu M12-2s Firmware<xcp3100
Oracle Ethernet Switch Es1-24 Firmware=1.3.1
Oracle Ethernet Switch Es1-24
Oracle Ethernet Switch Tor-72 Firmware=1.2.2
Oracle Ethernet Switch Tor-72
All of
Oracle Ethernet Switch Es2-64 Firmware=2.0.0.14
Oracle Ethernet Switch Es2-64
All of
Oracle Ethernet Switch Es2-72 Firmware=2.0.0.14
Oracle Ethernet Switch Es2-72
All of
Fujitsu M10-1 Firmware<xcp2400
Fujitsu M10-1
All of
Fujitsu M10-4 Firmware<xcp2400
Fujitsu M10-4
All of
Fujitsu M10-4s Firmware<xcp2400
Fujitsu M10-4s
All of
Fujitsu M12-1 Firmware<xcp2400
Fujitsu M12-1
All of
Fujitsu M12-2 Firmware<xcp2400
Fujitsu M12-2
All of
Fujitsu M12-2s Firmware<xcp2400
Fujitsu M12-2s
All of
Fujitsu M10-1 Firmware<xcp3100
Fujitsu M10-1
All of
Fujitsu M10-4 Firmware<xcp3100
Fujitsu M10-4
All of
Fujitsu M10-4s Firmware<xcp3100
Fujitsu M10-4s
All of
Fujitsu M12-1 Firmware<xcp3100
Fujitsu M12-1
All of
Fujitsu M12-2 Firmware<xcp3100
Fujitsu M12-2
All of
Fujitsu M12-2s Firmware<xcp3100
Fujitsu M12-2s
All of
Oracle Ethernet Switch Es1-24 Firmware=1.3.1
Oracle Ethernet Switch Es1-24
All of
Oracle Ethernet Switch Tor-72 Firmware=1.2.2
Oracle Ethernet Switch Tor-72
ubuntu/openssl<1.0.2
1.0.2
ubuntu/openssl1.0<1.0.2
1.0.2
debian/openssl
1.1.1n-0+deb10u3
1.1.1n-0+deb10u6
1.1.1w-0+deb11u1
1.1.1n-0+deb11u5
3.0.11-1~deb12u2
3.2.1-3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2020-1968?

    CVE-2020-1968 is a vulnerability that exploits a flaw in the TLS specification, allowing an attacker to compute the pre-master secret in connections using a Diffie-Hellman based cipher suite.

  • What is the severity of CVE-2020-1968?

    The severity of CVE-2020-1968 is medium, with a severity value of 3.7.

  • Which software versions are affected by CVE-2020-1968?

    CVE-2020-1968 affects OpenSSL versions up to but excluding 1.0.2 and 1.1.1n-0+deb10u3, 1.1.1n-0+deb10u6, 1.1.1w-0+deb11u1, 1.1.1n-0+deb11u5, 3.0.11-1~deb12u1, 3.0.11-1~deb12u2, 3.0.11-1, 3.0.12-1.

  • How can I fix CVE-2020-1968?

    To fix CVE-2020-1968, you should update your OpenSSL software to a version that includes the security patch.

  • Where can I find more information about CVE-2020-1968?

    You can find more information about CVE-2020-1968 on the official OpenSSL website and the provided references.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203