CVE-2016-2183

Current Description

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

Basic Data

PublishedSeptember 01, 2016
Last ModifiedJuly 15, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-200
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 3 - Attack VectorNETWORK
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredNONE
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactNONE
CVSS 3 - Availability ImpactNONE
CVSS 3 - Base Score7.5
CVSS 3 - Base SeverityHIGH
Exploitability Score3.9
Base SeverityHIGH

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatJboss Enterprise Application Platform6.0.0*******
    2.3ApplicationRedhatJboss Enterprise Web Server1.0.0*******
    2.3ApplicationRedhatJboss Enterprise Web Server2.0.0*******
    2.3ApplicationRedhatJboss Web Server3.0*******
    2.3OSRedhatEnterprise Linux5.0*******
    2.3OSRedhatEnterprise Linux6.0*******
    2.3OSRedhatEnterprise Linux7.0*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationPythonPython3.3*******
    2.3ApplicationPythonPython3.4.0*******
    2.3ApplicationPythonPython3.5*******
    2.3ApplicationPythonPython3.6*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationCiscoContent Security Management Appliance9.6.6-068*******
    2.3ApplicationCiscoContent Security Management Appliance9.7.0-006*******
  • OR - Configuration 4
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOpensslOpenssl1.0.1a*******
    2.3ApplicationOpensslOpenssl1.0.1b*******
    2.3ApplicationOpensslOpenssl1.0.1c*******
    2.3ApplicationOpensslOpenssl1.0.1d*******
    2.3ApplicationOpensslOpenssl1.0.1e*******
    2.3ApplicationOpensslOpenssl1.0.1f*******
    2.3ApplicationOpensslOpenssl1.0.1g*******
    2.3ApplicationOpensslOpenssl1.0.1h*******
    2.3ApplicationOpensslOpenssl1.0.1i*******
    2.3ApplicationOpensslOpenssl1.0.1j*******
    2.3ApplicationOpensslOpenssl1.0.1k*******
    2.3ApplicationOpensslOpenssl1.0.1l*******
    2.3ApplicationOpensslOpenssl1.0.1m*******
    2.3ApplicationOpensslOpenssl1.0.1n*******
    2.3ApplicationOpensslOpenssl1.0.1o*******
    2.3ApplicationOpensslOpenssl1.0.1p*******
    2.3ApplicationOpensslOpenssl1.0.1q*******
    2.3ApplicationOpensslOpenssl1.0.1r*******
    2.3ApplicationOpensslOpenssl1.0.1t*******
    2.3ApplicationOpensslOpenssl1.0.2a*******
    2.3ApplicationOpensslOpenssl1.0.2b*******
    2.3ApplicationOpensslOpenssl1.0.2c*******
    2.3ApplicationOpensslOpenssl1.0.2d*******
    2.3ApplicationOpensslOpenssl1.0.2e*******
    2.3ApplicationOpensslOpenssl1.0.2f*******
    2.3ApplicationOpensslOpenssl1.0.2h*******
  • OR - Configuration 5
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOracleDatabase11.2.0.4*******
    2.3ApplicationOracleDatabase12.1.0.2*******

Vulnerable Software List

VendorProductVersions
Redhat Jboss Enterprise Application Platform 6.0.0
Redhat Enterprise Linux 5.0, 6.0, 7.0
Redhat Jboss Enterprise Web Server 1.0.0, 2.0.0
Redhat Jboss Web Server 3.0
Openssl Openssl 1.0.1a, 1.0.1b, 1.0.1c, 1.0.1d, 1.0.1e, 1.0.1f, 1.0.1g, 1.0.1h, 1.0.1i, 1.0.1j, 1.0.1k, 1.0.1l, 1.0.1m, 1.0.1n, 1.0.1o, 1.0.1p, 1.0.1q, 1.0.1r, 1.0.1t, 1.0.2a, 1.0.2b, 1.0.2c, 1.0.2d, 1.0.2e, 1.0.2f, 1.0.2h
Cisco Content Security Management Appliance 9.6.6-068, 9.7.0-006
Oracle Database 11.2.0.4, 12.1.0.2
Python Python 3.3, 3.4.0, 3.5, 3.6

References

NameSourceURLTags
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759CONFIRMThird Party Advisory
SUSE-SU-2016:2470http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.htmlSUSEThird Party Advisory
RHSA-2017:0336http://rhn.redhat.com/errata/RHSA-2017-0336.htmlREDHATThird Party Advisory
RHSA-2017:0337http://rhn.redhat.com/errata/RHSA-2017-0337.htmlREDHATThird Party Advisory
RHSA-2017:0338http://rhn.redhat.com/errata/RHSA-2017-0338.htmlREDHATThird Party Advisory
RHSA-2017:0462http://rhn.redhat.com/errata/RHSA-2017-0462.htmlREDHATThird Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlCONFIRM
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlCONFIRMPatch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlCONFIRMPatch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlCONFIRMPatch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlCONFIRMPatch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlCONFIRMThird Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlhttp://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlCONFIRMThird Party Advisory
92630http://www.securityfocus.com/bid/92630BIDThird Party Advisory VDB Entry
95568http://www.securityfocus.com/bid/95568BIDThird Party Advisory VDB Entry
1036696http://www.securitytracker.com/id/1036696SECTRACKThird Party Advisory VDB Entry
http://www.splunk.com/view/SP-CAAAPSVhttp://www.splunk.com/view/SP-CAAAPSVCONFIRMThird Party Advisory
http://www.splunk.com/view/SP-CAAAPUEhttp://www.splunk.com/view/SP-CAAAPUECONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21991482http://www-01.ibm.com/support/docview.wss?uid=swg21991482CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21995039http://www-01.ibm.com/support/docview.wss?uid=swg21995039CONFIRMThird Party Advisory
https://access.redhat.com/articles/2548661https://access.redhat.com/articles/2548661CONFIRMMitigation Third Party Advisory
RHSA-2017:1216https://access.redhat.com/errata/RHSA-2017:1216REDHATThird Party Advisory
RHSA-2017:2708https://access.redhat.com/errata/RHSA-2017:2708REDHATThird Party Advisory
RHSA-2017:2709https://access.redhat.com/errata/RHSA-2017:2709REDHATThird Party Advisory
RHSA-2017:2710https://access.redhat.com/errata/RHSA-2017:2710REDHATThird Party Advisory
RHSA-2017:3113https://access.redhat.com/errata/RHSA-2017:3113REDHATThird Party Advisory
RHSA-2017:3114https://access.redhat.com/errata/RHSA-2017:3114REDHATThird Party Advisory
RHSA-2017:3239https://access.redhat.com/errata/RHSA-2017:3239REDHATThird Party Advisory
RHSA-2017:3240https://access.redhat.com/errata/RHSA-2017:3240REDHATThird Party Advisory
RHSA-2018:2123https://access.redhat.com/errata/RHSA-2018:2123REDHAT
RHSA-2019:1245https://access.redhat.com/errata/RHSA-2019:1245REDHAT
RHSA-2019:2859https://access.redhat.com/errata/RHSA-2019:2859REDHAT
RHSA-2020:0451https://access.redhat.com/errata/RHSA-2020:0451REDHAT
https://access.redhat.com/security/cve/cve-2016-2183https://access.redhat.com/security/cve/cve-2016-2183CONFIRMThird Party Advisory
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/MISCPress/Media Coverage Technical Description Third Party Advisory
https://bto.bluecoat.com/security-advisory/sa133https://bto.bluecoat.com/security-advisory/sa133CONFIRMThird Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1369383https://bugzilla.redhat.com/show_bug.cgi?id=1369383CONFIRMIssue Tracking Third Party Advisory
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633MISCThird Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_ushttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_usCONFIRMThird Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_ushttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_usCONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448CONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984CONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116CONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499CONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388CONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403CONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415CONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680CONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722CONFIRMThird Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849CONFIRMThird Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02MISC
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312CONFIRMThird Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10171https://kc.mcafee.com/corporate/index?page=content&id=SB10171CONFIRMThird Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10310https://kc.mcafee.com/corporate/index?page=content&id=SB10310CONFIRM
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/MISCPress/Media Coverage Technical Description Third Party Advisory
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/CONFIRMThird Party Advisory
GLSA-201612-16https://security.gentoo.org/glsa/201612-16GENTOOThird Party Advisory
GLSA-201701-65https://security.gentoo.org/glsa/201701-65GENTOOThird Party Advisory
GLSA-201707-01https://security.gentoo.org/glsa/201707-01GENTOOThird Party Advisory
https://security.netapp.com/advisory/ntap-20160915-0001/https://security.netapp.com/advisory/ntap-20160915-0001/CONFIRMThird Party Advisory
https://security.netapp.com/advisory/ntap-20170119-0001/https://security.netapp.com/advisory/ntap-20170119-0001/CONFIRMThird Party Advisory
https://sweet32.info/https://sweet32.info/MISCTechnical Description Third Party Advisory
[tls] 20091120 RC4+3DES rekeying - long-lived TLS connectionshttps://www.ietf.org/mail-archive/web/tls/current/msg04560.htmlMLISTMailing List Third Party Advisory
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008CONFIRM
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-onMISCPress/Media Coverage Technical Description Third Party Advisory
https://www.openssl.org/blog/blog/2016/08/24/sweet32/https://www.openssl.org/blog/blog/2016/08/24/sweet32/CONFIRMMitigation Press/Media Coverage Third Party Advisory
N/Ahttps://www.oracle.com/security-alerts/cpuapr2020.htmlN/A
https://www.oracle.com/security-alerts/cpujan2020.htmlhttps://www.oracle.com/security-alerts/cpujan2020.htmlMISC
https://www.oracle.com/security-alerts/cpujul2020.htmlhttps://www.oracle.com/security-alerts/cpujul2020.htmlMISC
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlMISC
https://www.sigsac.org/ccs/CCS2016/accepted-papers/https://www.sigsac.org/ccs/CCS2016/accepted-papers/MISCThird Party Advisory
https://www.tenable.com/security/tns-2016-16https://www.tenable.com/security/tns-2016-16CONFIRMThird Party Advisory
https://www.tenable.com/security/tns-2016-20https://www.tenable.com/security/tns-2016-20CONFIRMThird Party Advisory
https://www.tenable.com/security/tns-2016-21https://www.tenable.com/security/tns-2016-21CONFIRMThird Party Advisory
https://www.tenable.com/security/tns-2017-09https://www.tenable.com/security/tns-2017-09CONFIRMThird Party Advisory
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issuehttps://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issueMISCThird Party Advisory