High
CVE-2014-0160 (AKA: Heartbleed)
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2014-0160 (AKA: Heartbleed)
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
Add Assessment
Ratings
-
Attacker ValueHigh
-
ExploitabilityVery High
Technical Analysis
A missing boundary check causes versions of OpenSSL 1.0.1 – 1.0.1f to be vulnerable to an out of bounds read as part of an SSL Heartbeat message. This vulnerability can be leveraged without authenticating in many instances to leak sensitive information such as passwords and private keys. Due to the vulnerability being in the OpenSSL library, exploits are implementation specific and may require changes to implement the applicable protocol.
The vulnerability was fixed in this patch.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportRatings
-
Attacker ValueHigh
-
ExploitabilityVery High
Technical Analysis
A bit legendary at this point but memory chunks from VPN devices was a real problem. If vulnerable, got hit.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- broadcom,
- canonical,
- debian,
- fedoraproject,
- filezilla-project,
- intellian,
- mitel,
- openssl,
- opensuse,
- redhat,
- ricon,
- siemens,
- splunk
Products
- application processing engine firmware 2.0,
- cp 1543-1 firmware 1.1,
- debian linux 6.0,
- debian linux 7.0,
- debian linux 8.0,
- elan-8.2,
- enterprise linux desktop 6.0,
- enterprise linux server 6.0,
- enterprise linux server aus 6.5,
- enterprise linux server eus 6.5,
- enterprise linux server tus 6.5,
- enterprise linux workstation 6.0,
- fedora 19,
- fedora 20,
- filezilla server,
- gluster storage 2.1,
- micollab 6.0,
- micollab 7.0,
- micollab 7.1,
- micollab 7.2,
- micollab 7.3,
- micollab 7.3.0.104,
- mivoice 1.1.2.5,
- mivoice 1.1.3.3,
- mivoice 1.2.0.11,
- mivoice 1.3.2.2,
- mivoice 1.4.0.102,
- openssl,
- opensuse 12.3,
- opensuse 13.1,
- s9922l firmware 16.10.3(3794),
- simatic s7-1500 firmware 1.5,
- simatic s7-1500t firmware 1.5,
- splunk,
- storage 2.1,
- symantec messaging gateway 10.6.0,
- symantec messaging gateway 10.6.1,
- ubuntu linux 12.04,
- ubuntu linux 12.10,
- ubuntu linux 13.10,
- v100 firmware 1.20,
- v100 firmware 1.21,
- v100 firmware 1.24,
- v60 firmware 1.15,
- v60 firmware 1.25,
- virtualization 6.0,
- wincc open architecture 3.12
Metasploit Modules
Exploited in the Wild
Would you like to delete this Exploited in the Wild Report?
Yes, delete this reportWould you like to delete this Exploited in the Wild Report?
Yes, delete this reportReferences
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: