5.9
CVSSv3

CVE-2016-10213

Published: 08/02/2017 Updated: 01/03/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

A10 AX1030 and possibly other devices with software prior to 2.7.2-P8 uses random GCM nonce generations, which makes it easier for remote malicious users to obtain the authentication key and spoof data by leveraging a reused nonce in a session and a "forbidden attack," a similar issue to CVE-2016-0270.

Vulnerable Product Search on Vulmon Subscribe to Product

a10networks advanced core operating system

Github Repositories

Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS

Nonce-Disrespecting Adversaries We provide supplemental material to our research on AES-GCM nonce reuse vulnerabilities in TLS Research paper Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS (camera-ready version / Usenix WOOT16) Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS (preprint version / IACR ePrint) Online check Onl