CVE-2002-20001
Summary
| CVE | CVE-2002-20001 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-11-11 19:15:00 UTC |
| Updated | 2024-01-11 03:15:00 UTC |
| Description | The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE. |
Risk And Classification
Problem Types: CWE-400
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Balasys | Dheater | - | All | All | All |
| Application | F5 | Big-ip Access Policy Manager | All | All | All | All |
| Application | F5 | Big-ip Advanced Firewall Manager | All | All | All | All |
| Application | F5 | Big-ip Advanced Web Application Firewall | All | All | All | All |
| Application | F5 | Big-ip Analytics | All | All | All | All |
| Application | F5 | Big-ip Application Acceleration Manager | All | All | All | All |
| Application | F5 | Big-ip Application Security Manager | All | All | All | All |
| Application | F5 | Big-ip Application Visibility And Reporting | All | All | All | All |
| Application | F5 | Big-ip Carrier-grade Nat | All | All | All | All |
| Application | F5 | Big-ip Ddos Hybrid Defender | All | All | All | All |
| Application | F5 | Big-ip Domain Name System | All | All | All | All |
| Application | F5 | Big-ip Edge Gateway | All | All | All | All |
| Application | F5 | Big-ip Fraud Protection Service | All | All | All | All |
| Application | F5 | Big-ip Global Traffic Manager | All | All | All | All |
| Application | F5 | Big-ip Link Controller | All | All | All | All |
| Application | F5 | Big-ip Local Traffic Manager | All | All | All | All |
| Application | F5 | Big-ip Policy Enforcement Manager | All | All | All | All |
| Application | F5 | Big-ip Service Proxy | 1.6.0 | All | All | All |
| Application | F5 | Big-ip Ssl Orchestrator | All | All | All | All |
| Application | F5 | Big-ip Webaccelerator | All | All | All | All |
| Application | F5 | Big-ip Websafe | All | All | All | All |
| Application | F5 | Big-iq Centralized Management | 7.1.0 | All | All | All |
| Application | F5 | Big-iq Centralized Management | All | All | All | All |
| Application | F5 | F5os-a | 1.3.0 | All | All | All |
| Application | F5 | F5os-a | 1.3.1 | All | All | All |
| Application | F5 | F5os-c | 1.5.0 | All | All | All |
| Application | F5 | F5os-c | 1.5.1 | All | All | All |
| Application | F5 | F5os-c | All | All | All | All |
| Application | F5 | Traffix Sdc | 5.1.0 | All | All | All |
| Application | F5 | Traffix Sdc | 5.2.0 | All | All | All |
| Application | F5 | Traffix Signaling Delivery Controller | 5.1.0 | All | All | All |
| Application | F5 | Traffix Signaling Delivery Controller | 5.2.0 | All | All | All |
| Operating System | Hpe | Arubaos-cx | All | All | All | All |
| Hardware | Hpe | Aruba Cx 4100i | - | All | All | All |
| Hardware | Hpe | Aruba Cx 6100 | - | All | All | All |
| Hardware | Hpe | Aruba Cx 6200f | - | All | All | All |
| Hardware | Hpe | Aruba Cx 6200m | - | All | All | All |
| Hardware | Hpe | Aruba Cx 6300f | - | All | All | All |
| Hardware | Hpe | Aruba Cx 6300m | - | All | All | All |
| Hardware | Hpe | Aruba Cx 6405 | - | All | All | All |
| Hardware | Hpe | Aruba Cx 6410 | - | All | All | All |
| Hardware | Hpe | Aruba Cx 8320 | - | All | All | All |
| Hardware | Hpe | Aruba Cx 8325-32c | - | All | All | All |
| Hardware | Hpe | Aruba Cx 8325-48y8c | - | All | All | All |
| Hardware | Hpe | Aruba Cx 8360-12c | - | All | All | All |
| Hardware | Hpe | Aruba Cx 8360-16y2c | - | All | All | All |
| Hardware | Hpe | Aruba Cx 8360-24xf2c | - | All | All | All |
| Hardware | Hpe | Aruba Cx 8360-32y4c | - | All | All | All |
| Hardware | Hpe | Aruba Cx 8360-48xt4c | - | All | All | All |
| Hardware | Hpe | Aruba Cx 8360-48y6c | - | All | All | All |
| Hardware | Hpe | Aruba Cx 8400 | - | All | All | All |
| Hardware | Siemens | Scalance W1750d | - | All | All | All |
| Operating System | Siemens | Scalance W1750d Firmware | All | All | All | All |
| Application | Stormshield | Stormshield Management Center | All | All | All | All |
| Application | Stormshield | Stormshield Network Security | All | All | All | All |
| Operating System | Suse | Linux Enterprise Server | 11 | - | All | All |
| Operating System | Suse | Linux Enterprise Server | 12 | - | All | All |
| Operating System | Suse | Linux Enterprise Server | 15 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Vulnerability: DHEater aka CVE-2002-20001 | Support | SUSE | MISC | www.suse.com | |
| D(HE)at Attack / dheater · GitLab | MISC | gitlab.com | |
| GitHub - Balasys/dheater: D(HE)ater is a security tool can perform DoS attack by enforcing the DHE key exchange. | MISC | github.com | |
| Server overload by enforcing DHE key exchange using minimal bandwidth : netsec | MISC | www.reddit.com | |
| Configuring Supported TLS Groups in OpenSSL - OpenSSL Blog | MISC | www.openssl.org | |
| support.f5.com/csp/article/K83120834 | MISC | support.f5.com | |
| dheatattack.com | MISC | dheatattack.com | |
| D(HE)at Attack | D(HE)at Attack | dheatattack.gitlab.io | ||
| cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf | CONFIRM | cert-portal.siemens.com | |
| www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt | MISC | www.arubanetworks.com | |
| Stop recommending DHE, because of "dheater" vulnerability · Issue #162 · mozilla/ssl-config-generator · GitHub | MISC | github.com | |
| ResearchGate | MISC | www.researchgate.net | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.