NVD - CVE-2002-20001 (original) (raw)

Change History

12 change records found show changes

CVE Modified by MITRE 5/13/2024 9:22:35 PM

Action Type Old Value New Value

CVE Modified by MITRE 4/23/2024 3:15:41 AM

Action Type Old Value New Value
Added Reference MITRE https://ieeexplore.ieee.org/document/10374117 [No types assigned]

CVE Modified by MITRE 1/10/2024 10:15:08 PM

Action Type Old Value New Value
Added Reference MITRE https://dheatattack.gitlab.io/ [No types assigned]

CVE Modified by MITRE 9/25/2023 1:15:09 AM

Action Type Old Value New Value
Changed Description Record truncated, showing 500 of 578 characters. View Entire Change Record The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it Record truncated, showing 500 of 589 characters. View Entire Change Record The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must cla
Added Reference https://gitlab.com/dheatattack/dheater [No Types Assigned]

CPE Deprecation Remap by NIST 8/16/2023 10:17:11 AM

Action Type Old Value New Value
Changed CPE Configuration OR *cpe:2.3:a:f5:traffix_sdc:5.1.0:*:*:*:*:*:*:* OR *cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.1.0:*:*:*:*:*:*:*

CPE Deprecation Remap by NIST 8/16/2023 10:17:11 AM

Action Type Old Value New Value
Changed CPE Configuration OR *cpe:2.3:a:f5:traffix_sdc:5.2.0:*:*:*:*:*:*:* OR *cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.2.0:*:*:*:*:*:*:*

Reanalysis by NIST 7/18/2023 8:55:30 PM

Action Type Old Value New Value
Added CPE Configuration OR *cpe:2.3:a:stormshield:stormshield_management_center:*:*:*:*:*:*:*:* versions up to (excluding) 3.3.3 *cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:* versions from (including) 2.7.0 up to (excluding) 4.3.16 *cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:* versions from (including) 4.4.0 up to (excluding) 4.6.3

Modified Analysis by NIST 5/16/2023 12:15:29 PM

Action Type Old Value New Value
Added CPE Configuration Record truncated, showing 500 of 1514 characters. View Entire Change Record AND OR *cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:* versions from (including) 10.06.0000 up to (excluding) 10.06.0180 *cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:* versions from (including) 10.07.0000 up to (excluding) 10.07.0030 *cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:* versions from (including) 10.08.0000 up to (excluding) 10.08.0010 *cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:* versions from (including) 10.09.0000 up to (excluding) 10.09.0002 OR
Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*
Added CPE Configuration Record truncated, showing 500 of 2960 characters. View Entire Change Record OR *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 17.1.0 *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 17.1.0 *cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 17.1.0 *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 13.1.0 up to (including) 17.1.0
Added CPE Configuration OR *cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*
Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf Third Party Advisory
Changed Reference Type https://dheatattack.com No Types Assigned https://dheatattack.com Third Party Advisory
Changed Reference Type https://github.com/Balasys/dheater Third Party Advisory https://github.com/Balasys/dheater Product
Changed Reference Type https://github.com/mozilla/ssl-config-generator/issues/162 Third Party Advisory https://github.com/mozilla/ssl-config-generator/issues/162 Issue Tracking
Changed Reference Type https://support.f5.com/csp/article/K83120834 No Types Assigned https://support.f5.com/csp/article/K83120834 Third Party Advisory
Changed Reference Type https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt No Types Assigned https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt Third Party Advisory
Changed Reference Type https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/ No Types Assigned https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/ Third Party Advisory
Changed Reference Type https://www.reddit.com/r/netsec/comments/qdoosy/server\_overload\_by\_enforcing\_dhe\_key\_exchange/ Third Party Advisory https://www.reddit.com/r/netsec/comments/qdoosy/server\_overload\_by\_enforcing\_dhe\_key\_exchange/ Issue Tracking
Changed Reference Type https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745\_Security\_Issues\_in\_the\_Diffie-Hellman\_Key\_Agreement\_Protocol Exploit, Third Party Advisory https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745\_Security\_Issues\_in\_the\_Diffie-Hellman\_Key\_Agreement\_Protocol Exploit, Technical Description
Changed Reference Type https://www.suse.com/support/kb/doc/?id=000020510 No Types Assigned https://www.suse.com/support/kb/doc/?id=000020510 Third Party Advisory

CVE Modified by MITRE 11/09/2022 1:15:11 PM

Action Type Old Value New Value
Added Reference https://dheatattack.com [No Types Assigned]
Added Reference https://support.f5.com/csp/article/K83120834 [No Types Assigned]
Added Reference https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt [No Types Assigned]
Added Reference https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/ [No Types Assigned]
Added Reference https://www.suse.com/support/kb/doc/?id=000020510 [No Types Assigned]

CVE Modified by MITRE 11/08/2022 9:15:11 AM

Action Type Old Value New Value
Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf [No Types Assigned]

Initial Analysis by NIST 11/16/2021 10:36:58 AM

Action Type Old Value New Value
Added CPE Configuration OR *cpe:2.3:a:balasys:dheater:-:*:*:*:*:*:*:*
Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE NIST CWE-400
Changed Reference Type https://github.com/Balasys/dheater No Types Assigned https://github.com/Balasys/dheater Third Party Advisory
Changed Reference Type https://github.com/mozilla/ssl-config-generator/issues/162 No Types Assigned https://github.com/mozilla/ssl-config-generator/issues/162 Third Party Advisory
Changed Reference Type https://www.reddit.com/r/netsec/comments/qdoosy/server\_overload\_by\_enforcing\_dhe\_key\_exchange/ No Types Assigned https://www.reddit.com/r/netsec/comments/qdoosy/server\_overload\_by\_enforcing\_dhe\_key\_exchange/ Third Party Advisory
Changed Reference Type https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745\_Security\_Issues\_in\_the\_Diffie-Hellman\_Key\_Agreement\_Protocol No Types Assigned https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745\_Security\_Issues\_in\_the\_Diffie-Hellman\_Key\_Agreement\_Protocol Exploit, Third Party Advisory

CVE Modified by MITRE 11/11/2021 6:15:07 PM

Action Type Old Value New Value
Added Reference https://github.com/mozilla/ssl-config-generator/issues/162 [No Types Assigned]
Added Reference https://www.reddit.com/r/netsec/comments/qdoosy/server\_overload\_by\_enforcing\_dhe\_key\_exchange/ [No Types Assigned]