Skip to content

Uncovered Vulnerabilities

mmaehren edited this page Sep 28, 2024 · 5 revisions

The following vulnerabilties have been found in studies utilizing TLS-Attacker

Large-scale analyses of (new) TLS vulnerabilities

Cryptographic vulnerabilities

DoS vulnerabilities

  • CVE2022-2576, CVE-2023-21835, and CVE-2022-34293. Allows remote attackers to cause a denial of service via DTLS. Presented in the paper Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet by Erinola et al.
  • A DoS parsing bug in the MatrixSSL TLS 1.3 client. Presented in the paper TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries by Maehren et al.

State machine vulnerabilities

  • State machine vulnerability enabling client-authentication bypass in Java Secure Socket Extension (JSSE). CVE-2020-2655 (https://nvd.nist.gov/vuln/detail/CVE-2020-2655). Presented in the paper Analysis of DTLS Implementations Using Protocol State Fuzzing by Fiterau-Brostean et al.
  • State machine vulnerability in PionDTLS allowed for sending unencrypted application data in epoch 0. Presented in the paper Analysis of DTLS Implementations Using Protocol State Fuzzing by Fiterau-Brostean et al.
  • Denial of Service and infinite loop in the TLS client. CVE-2021-44718 (https://nvd.nist.gov/vuln/detail/CVE-2021-44718). Presented in the paper The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning by McMahon Stone et al.

Buffer boundary violations and other issues

  • Botan 1.11.28, Out-of-bound read (not exploitable) by sending empty TLS records, see Botan Version 1.11.29. Presented in the paper Systematic fuzzing and testing of TLS libraries by Somorovsky
  • OpenSSL server silently accepts ClientHello messages with invalid Extension lengths. https://github.com/openssl/openssl/issues/265. Presented in the paper Systematic fuzzing and testing of TLS libraries by Somorovsky