|Title:||OpenSSL: Raccoon Attack (CVE-2020-1968) (Windows)|
|Summary:||OpenSSL is prone to Racoon attacks.|
OpenSSL is prone to Racoon attacks.
The Raccoon attack exploits a flaw in the TLS specification which can lead to
an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH)
based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted
communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH
secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites.
An attacker may eavesdrop on encrypted communications sent over a TLS connection.
OpenSSL versions 1.0.2 - 1.0.2v and probably 1.1.0.
Update OpenSSL to version 1.0.2w, 1.1.1 or later.
Common Vulnerability Exposure (CVE) ID: CVE-2020-1968|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.