5.9
CVSSv3

CVE-2017-13098

Published: 13/12/2017 Updated: 20/10/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 471
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as "ROBOT."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bouncycastle legion-of-the-bouncy-castle-java-crytography-api

Vendor Advisories

Debian Bug report logs - #884241 bouncycastle: CVE-2017-13098 Package: src:bouncycastle; Maintainer for src:bouncycastle is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 12 Dec 2017 20:57:04 UTC Owned by: Markus Koschany <apo ...
Hanno Boeck, Juraj Somorovsky and Craig Young discovered that the TLS implementation in Bouncy Castle is vulnerable to an adaptive chosen ciphertext attack against RSA keys For the stable distribution (stretch), this problem has been fixed in version 156-1+deb9u1 We recommend that you upgrade your bouncycastle packages For the detailed security ...
BouncyCastle TLS prior to version 103, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated An attacker can recover the private key from a vulnerable application This vulnerability is referred to as "ROBOT" ...