Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2002-20001


The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.


Published

2021-11-11T19:15:07.380

Last Modified

2025-04-15T14:08:06.963

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-400

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application balasys dheater - Yes
Operating System siemens scalance_w1750d_firmware * Yes
Hardware siemens scalance_w1750d - No
Operating System suse linux_enterprise_server 11 Yes
Operating System suse linux_enterprise_server 12 Yes
Operating System suse linux_enterprise_server 15 Yes
Application f5 big-ip_access_policy_manager ≤ 17.1.0 Yes
Application f5 big-ip_advanced_firewall_manager ≤ 17.1.0 Yes
Application f5 big-ip_advanced_web_application_firewall ≤ 17.1.0 Yes
Application f5 big-ip_analytics ≤ 17.1.0 Yes
Application f5 big-ip_application_acceleration_manager ≤ 17.1.0 Yes
Application f5 big-ip_application_security_manager ≤ 17.1.0 Yes
Application f5 big-ip_application_visibility_and_reporting ≤ 17.1.0 Yes
Application f5 big-ip_carrier-grade_nat ≤ 17.1.0 Yes
Application f5 big-ip_ddos_hybrid_defender ≤ 17.1.0 Yes
Application f5 big-ip_domain_name_system ≤ 17.1.0 Yes
Application f5 big-ip_edge_gateway ≤ 17.1.0 Yes
Application f5 big-ip_fraud_protection_service ≤ 17.1.0 Yes
Application f5 big-ip_global_traffic_manager ≤ 17.1.0 Yes
Application f5 big-ip_link_controller ≤ 17.1.0 Yes
Application f5 big-ip_local_traffic_manager ≤ 17.1.0 Yes
Application f5 big-ip_policy_enforcement_manager ≤ 17.1.0 Yes
Application f5 big-ip_service_proxy 1.6.0 Yes
Application f5 big-ip_ssl_orchestrator ≤ 17.1.0 Yes
Application f5 big-ip_webaccelerator ≤ 17.1.0 Yes
Application f5 big-ip_websafe ≤ 17.1.0 Yes
Application f5 big-iq_centralized_management ≤ 8.2.0 Yes
Application f5 big-iq_centralized_management 7.1.0 Yes
Application f5 traffix_signaling_delivery_controller 5.1.0 Yes
Application f5 traffix_signaling_delivery_controller 5.2.0 Yes
Operating System f5 f5os-a 1.3.0 Yes
Operating System f5 f5os-a 1.3.1 Yes
Operating System f5 f5os-c ≤ 1.3.2 Yes
Operating System f5 f5os-c 1.5.0 Yes
Operating System f5 f5os-c 1.5.1 Yes
Operating System hpe arubaos-cx < 10.06.0180 Yes
Operating System hpe arubaos-cx < 10.07.0030 Yes
Operating System hpe arubaos-cx < 10.08.0010 Yes
Operating System hpe arubaos-cx < 10.09.0002 Yes
Hardware hpe aruba_cx_4100i - No
Hardware hpe aruba_cx_6100 - No
Hardware hpe aruba_cx_6200f - No
Hardware hpe aruba_cx_6200m - No
Hardware hpe aruba_cx_6300f - No
Hardware hpe aruba_cx_6300m - No
Hardware hpe aruba_cx_6405 - No
Hardware hpe aruba_cx_6410 - No
Hardware hpe aruba_cx_8320 - No
Hardware hpe aruba_cx_8325-32c - No
Hardware hpe aruba_cx_8325-48y8c - No
Hardware hpe aruba_cx_8360-12c - No
Hardware hpe aruba_cx_8360-16y2c - No
Hardware hpe aruba_cx_8360-24xf2c - No
Hardware hpe aruba_cx_8360-32y4c - No
Hardware hpe aruba_cx_8360-48xt4c - No
Hardware hpe aruba_cx_8360-48y6c - No
Hardware hpe aruba_cx_8400 - No
Application stormshield stormshield_management_center < 3.3.3 Yes
Application stormshield stormshield_network_security < 4.3.16 Yes
Application stormshield stormshield_network_security < 4.6.3 Yes

References