CVE-2013-2566
Summary
| CVE | CVE-2013-2566 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-03-15 21:55:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. |
Risk And Classification
Primary CVSS: v3.0 5.9 MEDIUM from [email protected]
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Problem Types: CWE-326 | n/a
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Primary | 5.9 | MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
| 2.0 | [email protected] | Primary | 4.3 | AV:N/AC:M/Au:N/C:P/I:N/A:N |
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
HighPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:N/AC:M/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 12.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 13.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 13.10 | All | All | All |
| Hardware | Fujitsu | M10-1 | - | All | All | All |
| Operating System | Fujitsu | M10-1 Firmware | All | All | All | All |
| Hardware | Fujitsu | M10-4 | - | All | All | All |
| Hardware | Fujitsu | M10-4s | - | All | All | All |
| Operating System | Fujitsu | M10-4s Firmware | All | All | All | All |
| Operating System | Fujitsu | M10-4 Firmware | All | All | All | All |
| Hardware | Fujitsu | Sparc Enterprise M3000 | - | All | All | All |
| Operating System | Fujitsu | Sparc Enterprise M3000 Firmware | All | All | All | All |
| Hardware | Fujitsu | Sparc Enterprise M4000 | - | All | All | All |
| Operating System | Fujitsu | Sparc Enterprise M4000 Firmware | All | All | All | All |
| Hardware | Fujitsu | Sparc Enterprise M5000 | - | All | All | All |
| Operating System | Fujitsu | Sparc Enterprise M5000 Firmware | All | All | All | All |
| Hardware | Fujitsu | Sparc Enterprise M8000 | - | All | All | All |
| Operating System | Fujitsu | Sparc Enterprise M8000 Firmware | All | All | All | All |
| Hardware | Fujitsu | Sparc Enterprise M9000 | - | All | All | All |
| Operating System | Fujitsu | Sparc Enterprise M9000 Firmware | All | All | All | All |
| Application | Mozilla | Firefox | All | All | All | All |
| Application | Oracle | Communications Application Session Controller | All | All | All | All |
| Application | Oracle | Http Server | 11.1.1.7.0 | All | All | All |
| Application | Oracle | Http Server | 11.1.1.9.0 | All | All | All |
| Application | Oracle | Http Server | 12.1.3.0.0 | All | All | All |
| Application | Oracle | Http Server | 12.2.1.1.0 | All | All | All |
| Application | Oracle | Http Server | 12.2.1.2.0 | All | All | All |
| Operating System | Oracle | Integrated Lights Out Manager Firmware | All | All | All | All |
| Operating System | Oracle | Integrated Lights Out Manager Firmware | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Gentoo Security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| Opera for Mobile Devices | af854a3a-2127-422b-91ae-364da2661108 | www.opera.com | Third Party Advisory |
| The Opera Security group - On the Precariousness of RC4 | af854a3a-2127-422b-91ae-364da2661108 | my.opera.com | Third Party Advisory |
| Oracle Critical Patch Update - October 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| USN-2032-1: Thunderbird vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| SSL/TLS RC4 CVE-2013-2566 Information Disclosure Weakness | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| '[security bulletin] HPSBGN03324 rev.1 - HP Business Service Automation Essentials Core, Remote Discl' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | Issue Tracking, Third Party Advisory |
| cr.yp.to/talks/2013.03.12/slides.pdf | af854a3a-2127-422b-91ae-364da2661108 | cr.yp.to | Third Party Advisory |
| A Few Thoughts on Cryptographic Engineering: Attack of the week: RC4 is kind of broken in TLS | af854a3a-2127-422b-91ae-364da2661108 | blog.cryptographyengineering.com | Third Party Advisory |
| Gentoo Linux Documentation -- Mozilla Network Security Service: Multiple vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| Oracle Critical Patch Update - July 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Welcome - Opera Security Corner | af854a3a-2127-422b-91ae-364da2661108 | www.opera.com | Third Party Advisory |
| MFSA 2013-103: Miscellaneous Network Security Services (NSS) vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.mozilla.org | Third Party Advisory |
| Oracle Critical Patch Update - October 2017 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Oracle Critical Patch Update - January 2018 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Oracle Critical Patch Update Advisory - April 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| On the Security of RC4 in TLS | af854a3a-2127-422b-91ae-364da2661108 | www.isg.rhul.ac.uk | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPView | af854a3a-2127-422b-91ae-364da2661108 | kb.juniper.net | Third Party Advisory |
| USN-2031-1: Firefox vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 591186 Mitsubishi Electric Air Conditioning Systems Multiple Vulnerabilities (ICSA-22-160-01)