CVE-2017-17427
MEDIUM
5,9
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
MEDIUM
4,3
Source: [email protected]
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: none
Availability: none
Description
AI Translation Available
Radware Alteon devices with a firmware version between 31.0.0.0-31.0.3.0 are vulnerable to an adaptive-chosen ciphertext attack ('Bleichenbacher attack'). This allows an attacker to decrypt observed traffic that has been encrypted with the RSA cipher and to perform other private key operations.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,7660
Percentile
1,0th
Updated
EPSS Score Trend (Last 90 Days)
203
Observable Discrepancy
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Access Control
Potential Impacts:
Read Application Data
Bypass Protection Mechanism
Applicable Platforms
All platforms may be affected
Operating System
Alteon Firmware by Radware
Version Range Affected
From
31.0.0.0
(inclusive)
To
31.0.3.0
(inclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:radware:alteon_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://robotattack.org/
https://support.radware.com/app/answers/answer_view/a_id/1010361/~/cve-2017-174…
https://www.kb.cert.org/vuls/id/144389
http://www.securityfocus.com/bid/102199
https://robotattack.org/
https://support.radware.com/app/answers/answer_view/a_id/1010361/~/cve-2017-174…
https://www.kb.cert.org/vuls/id/144389
http://www.securityfocus.com/bid/102199