CVE-2013-3587
Published on: 02/21/2020 12:00:00 AM UTC
Last Modified on: 01/01/2022 07:44:00 PM UTC
Certain versions of Arx from F5 contain the following vulnerability:
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.
- CVE-2013-3587 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 5.9 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | HIGH | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Third Party Advisory www.iacr.org application/pdf |
![]() | |
BREACH Compression Attack Steals SSL Secrets - Slashdot | Third Party Advisory slashdot.org text/html |
![]() |
995168 – (BREACH, CVE-2013-3587) CVE-2013-3587 BREACH attack against HTTP compression | Issue Tracking Third Party Advisory bugzilla.redhat.com text/html |
![]() |
#254895 SSL : breach compression attack (CVE-2013-3587) effects legalrobot.com - HackerOne | Exploit Third Party Advisory hackerone.com text/html |
![]() |
BREACH | Third Party Advisory breachattack.com text/html |
![]() |
Black Hat USA 2013 | Briefings | Third Party Advisory www.blackhat.com text/html |
![]() |
Security advisory: BREACH and Django | Weblog | Django | Third Party Advisory www.djangoproject.com text/html |
![]() |
Vulnerability Note VU#987798 - BREACH vulnerability in compressed HTTPS | Third Party Advisory US Government Resource www.kb.cert.org text/html |
![]() |
GitHub - meldium/breach-mitigation-rails: Make Rails apps more resilient against the BREACH and CRIME attacks | Third Party Advisory github.com text/html |
![]() |
Pony Mail! | lists.apache.org text/html |
![]() |
No Description Provided | Third Party Advisory support.f5.com text/html |
![]() |
cryptography - Is HTTP compression safe? - IT Security Stack Exchange | Exploit Third Party Advisory security.stackexchange.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
- cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:firepass:7.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:firepass:7.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:firepass:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE