Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
History

Tue, 01 Oct 2024 02:15:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Moderate

threat_severity

Low


Thu, 29 Aug 2024 22:30:00 +0000

Type Values Removed Values Added
Title openssl: From NVD collector openssl: remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations
References

Thu, 29 Aug 2024 17:15:00 +0000

Type Values Removed Values Added
Title openssl: From NVD collector
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 26 Aug 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Diffie-hellman Key Exchange Project
Diffie-hellman Key Exchange Project diffie-hellman Key Exchange
Weaknesses CWE-295
CPEs cpe:2.3:a:diffie-hellman_key_exchange_project:diffie-hellman_key_exchange:-:*:*:*:*:*:*:*
Vendors & Products Diffie-hellman Key Exchange Project
Diffie-hellman Key Exchange Project diffie-hellman Key Exchange
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Aug 2024 06:15:00 +0000

Type Values Removed Values Added
Description Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-08-26T00:00:00

Updated: 2024-08-26T15:17:29.404Z

Reserved: 2024-07-26T00:00:00

Link: CVE-2024-41996

cve-icon Vulnrichment

Updated: 2024-08-26T15:17:17.331Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-26T06:15:04.603

Modified: 2024-08-26T16:35:11.247

Link: CVE-2024-41996

cve-icon Redhat

Severity : Low

Publid Date: 2024-08-26T06:15:04Z

Links: CVE-2024-41996 - Bugzilla