4.3
CVSSv2

CVE-2019-1563

Published: 10/09/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.7 | Impact Score: 1.4 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

Vendor Advisories

Several security issues were fixed in OpenSSL ...
Synopsis Moderate: Red Hat JBoss Core Services Apache HTTP Server 2437 SP2 security update Type/Severity Security Advisory: Moderate Topic Red Hat JBoss Core Services Pack Apache Server 2437 Service Pack 2 zip release for RHEL 6, RHEL 7 and Microsoft Windows is availableRed Hat Product Security has rat ...
Synopsis Moderate: openssl security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for openssl is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) ba ...
Synopsis Important: Container-native Virtualization security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic Red Hat OpenShift Virtualization release 240 is now available with updates to packages and images that fix several bugs and add enhancementsRed Hat Product Securi ...
Synopsis Moderate: Red Hat JBoss Core Services Apache HTTP Server 2437 SP2 security update Type/Severity Security Advisory: Moderate Topic Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2437 and fix several bugs, and add various enhancements are now available for Red Hat En ...
Synopsis Moderate: OpenShift Container Platform 461 image security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenShift Container Platform 46Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability S ...
Two security issues were discovered in OpenSSL: A timing attack against ECDSA and a padding oracle in PKCS7_dataDecode() and CMS_decrypt_set1_pkey() For the oldstable distribution (stretch), these problems have been fixed in version 102t-1~deb9u1 We recommend that you upgrade your openssl10 packages For the detailed security status of openssl ...
Three security issues were discovered in OpenSSL: A timing attack against ECDSA, a padding oracle in PKCS7_dataDecode() and CMS_decrypt_set1_pkey() and it was discovered that a feature of the random number generator (RNG) intended to protect against shared RNG state between parent and child processes in the event of a fork() syscall was not used by ...
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher paddi ...
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher paddi ...
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve) In those cases it is possible that such a group does not have the cofactor present This can occur even where all ...
Impact: Low Public Date: 2019-09-10 CWE: CWE-200 Bugzilla: 1752100: CVE-2019-1563 openssl: information ...
Tenablesc leverages third-party software to help provide underlying functionality Three separate third-party components (OpenSSL, Apache HTTP Server, SimpleSAMLphp) were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bun ...
Cosminexus HTTP Server contain the following vulnerabilities: CVE-2019-1547, CVE-2019-1549, CVE-2019-1563 Affected products and versions are listed below Please upgrade your version to the appropriate version This problem occurs only if the SSL function is being used ...
Multiple vulnerabilities have been found in JP1/Automatic Job Management System 3 - Web Operation Assistant CVE-2018-0739, CVE-2018-1301, CVE-2019-1559, CVE-2019-1563, CVE-2020-1938 Affected products and versions are listed below Please upgrade your version to the appropriate version ...
JP1 contain the following vulnerabilities: CVE-2019-1549, CVE-2019-1563 Affected products and versions are listed below Please upgrade your version to the appropriate version ...
Multiple vulnerabilities have been found in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center CVE-2019-1547, CVE-2019-1549, CVE-2019-1551, CVE-2019-1563, CVE-2020-1971, CVE-2021-3711, CVE-2021-3712, CVE-2021-23840, CVE-2021-23841, CVE-2022-0778, CVE- ...

ICS Advisories

Hitachi Energy APM Edge
Critical Infrastructure Sectors: Energy

Github Repositories

CVE Management System Overview This Flask application provides a simple API for managing Common Vulnerabilities and Exposures (CVE) data It allows users to retrieve, add, and delete CVE records stored in a SQLite database Setup Instructions Dependencies Python 3121 Flask==202 Flask-SQLAlchemy==301 Install the required dependencie

References

CWE-327CWE-203https://www.openssl.org/news/secadv/20190910.txthttps://seclists.org/bugtraq/2019/Sep/25http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.htmlhttps://security.netapp.com/advisory/ntap-20190919-0002/http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.htmlhttps://lists.debian.org/debian-lts-announce/2019/09/msg00026.htmlhttps://kc.mcafee.com/corporate/index?page=content&id=SB10365https://www.oracle.com/security-alerts/cpuoct2020.htmlhttps://usn.ubuntu.com/4504-1/https://usn.ubuntu.com/4376-2/https://www.oracle.com/security-alerts/cpujul2020.htmlhttps://usn.ubuntu.com/4376-1/https://www.oracle.com/security-alerts/cpuapr2020.htmlhttps://www.oracle.com/security-alerts/cpujan2020.htmlhttps://www.tenable.com/security/tns-2019-09https://security.gentoo.org/glsa/201911-04https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.htmlhttps://www.debian.org/security/2019/dsa-4540https://www.debian.org/security/2019/dsa-4539https://seclists.org/bugtraq/2019/Oct/0https://seclists.org/bugtraq/2019/Oct/1https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=08229ad838c50f644d7e928e2eef147b4308ad64https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=631f94db0065c78181ca9ba5546ebc8bb3884b97https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893fhttps://support.f5.com/csp/article/K97324400?utm_source=f5support&%3Butm_medium=RSShttps://usn.ubuntu.com/4376-1/https://nvd.nist.govhttps://www.cisa.gov/uscert/ics/advisories/icsa-21-336-06