CVE-2016-2183
Summary
| CVE | CVE-2016-2183 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-09-01 00:59:00 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. |
Risk And Classification
Primary CVSS: v3.1 7.5 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Problem Types: CWE-200 | n/a
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| 2.0 | [email protected] | Primary | 5 | AV:N/AC:L/Au:N/C:P/I:N/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:N/AC:L/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Python | Python | All | All | All | All |
| Operating System | Redhat | Enterprise Linux | 5.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
| Application | Redhat | Jboss Enterprise Application Platform | 6.0.0 | All | All | All |
| Application | Redhat | Jboss Enterprise Web Server | 1.0.0 | All | All | All |
| Application | Redhat | Jboss Enterprise Web Server | 2.0.0 | All | All | All |
| Application | Redhat | Jboss Web Server | 3.0 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| McAfee Security Bulletin: Updates fix multiple OpenSSL vulnerabilities (CVE-2016-6304, CVE-2016-2183, CVE-2016-2182, and CVE-2016-7052) | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| USN-3179-1: OpenJDK 8 vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| [security-announce] openSUSE-SU-2016:2496-1: important: Security update | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Bugtraq | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| Splunk Enterprise 6.4.5 addresses multiple vulnerabilities | Splunk | af854a3a-2127-422b-91ae-364da2661108 | www.splunk.com | Third Party Advisory |
| [security-announce] SUSE-SU-2017:1444-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| Mitel Product Security Advisory 17-0008 | af854a3a-2127-422b-91ae-364da2661108 | www.mitel.com | Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| [security-announce] SUSE-SU-2016:2458-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| SWEET32: Birthday attacks against TLS ciphers with 64bit block size (CVE-2016-2183) - Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Mitigation, Third Party Advisory |
| Bugtraq | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| Oracle Critical Patch Update Advisory - October 2021 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Oracle VM Server for x86 Bulletin - October 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Third Party Advisory |
| Full Disclosure: Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| USN-3087-2: OpenSSL regression | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| Bugtraq | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.vicarius.io | |
| Bugtraq | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| [security-announce] SUSE-SU-2016:2394-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Full Disclosure: SSD Advisory – IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| Bugtraq: [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| January 2017 Java Platform Standard Edition Vulnerabilities in Multiple NetApp Products | NetApp Product Security | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | Third Party Advisory |
| [R1] LCE 5.0.1 Fixes Two Third-party Library Vulnerabilities - Security Advisory | Tenable™ | af854a3a-2127-422b-91ae-364da2661108 | www.tenable.com | Third Party Advisory |
| Security updates for all active release lines, September 2016 | Node.js | af854a3a-2127-422b-91ae-364da2661108 | nodejs.org | Third Party Advisory |
| Knowledge Center | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | Third Party Advisory |
| Philips Intellispace Portal ISP Vulnerabilities | ICS-CERT | af854a3a-2127-422b-91ae-364da2661108 | ics-cert.us-cert.gov | Third Party Advisory, US Government Resource |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| Oracle Critical Patch Update - October 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| Bugtraq | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| [security-announce] SUSE-SU-2016:2387-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Oracle Critical Patch Update - July 2019 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| IBM Informix Dynamic Server DLL Injection / Code Execution ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | Third Party Advisory, VDB Entry |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| Bugtraq | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| [security-announce] openSUSE-SU-2016:2407-1: important: Security update | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| The SWEET32 Issue, CVE-2016-2183 - OpenSSL Blog | af854a3a-2127-422b-91ae-364da2661108 | www.openssl.org | Mitigation, Press/Media Coverage, Third Party Advisory |
| OpenSSL: Multiple vulnerabilities (GLSA 201612-16) — Gentoo security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| Public KB - SA40312 - September 22 2016 OpenSSL Security Advisory | af854a3a-2127-422b-91ae-364da2661108 | kb.pulsesecure.net | Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Third Party Advisory |
| [security-announce] SUSE-SU-2016:2469-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Third Party Advisory |
| [security-announce] SUSE-SU-2017:2700-1: important: Security update for SLES 12-SP1 Docker image - openSUSE Security Announce - openSUSE Mailing Lists | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 | af854a3a-2127-422b-91ae-364da2661108 | softwaresupport.softwaregrp.com | Third Party Advisory |
| IBM Security Bulletin: OpenSSL and OpenVPN vulnerabilities affect IBM Rational Team Concert (CVE-2016-2183, CVE-2016-6329) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| IBM Security Bulletin: IBM i is affected by several vulnerabilities (CVE-2016-2183 and CVE-2016-6329) - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| Bug 1369383 – CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| Bugtraq | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| USN-3087-1: OpenSSL vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| McAfee Security Bulletin - Network Security Manager/Network Security Platform/Network Threat Behavior Analysis update fixes multiple vulnerabilities (CVE-2013-4559, CVE-2015-3200, CVE-2016-2183, CVE-2020-7256, CVE-2020-7258) | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | Third Party Advisory |
| www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.vicarius.io | |
| Security Advisories - OpenDaylight Project | af854a3a-2127-422b-91ae-364da2661108 | wiki.opendaylight.org | Third Party Advisory |
| IcedTea: Multiple vulnerabilities (GLSA 201707-01) — Gentoo security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| Anatomy of a cryptographic collision – the “Sweet32” attack – Naked Security | af854a3a-2127-422b-91ae-364da2661108 | nakedsecurity.sophos.com | Press/Media Coverage, Technical Description, Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Third Party Advisory |
| Security Advisory 0024 - Arista | af854a3a-2127-422b-91ae-364da2661108 | www.arista.com | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| support.f5.com/csp/article/K13167034 | af854a3a-2127-422b-91ae-364da2661108 | support.f5.com | Third Party Advisory |
| Oracle Critical Patch Update Advisory - October 2020 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Debian -- Security Information -- DSA-3673-1 openssl | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| Juniper Networks - 2016-10 Security Bulletin: OpenSSL security updates | af854a3a-2127-422b-91ae-364da2661108 | kb.juniper.net | Third Party Advisory |
| [security-announce] SUSE-SU-2016:2468-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Broadcom Support Portal | af854a3a-2127-422b-91ae-364da2661108 | bto.bluecoat.com | Third Party Advisory |
| Oracle Critical Patch Update Advisory - April 2020 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN | af854a3a-2127-422b-91ae-364da2661108 | sweet32.info | Technical Description, Third Party Advisory |
| CVE-2016-2183 - Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| New Practical Attacks on 64-bit Block Ciphers (3DES, Blowfish) | af854a3a-2127-422b-91ae-364da2661108 | www.nccgroup.trust | Press/Media Coverage, Technical Description, Third Party Advisory |
| Bugtraq | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| [security-announce] openSUSE-SU-2018:0458-1: important: Security update | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| Oracle Critical Patch Update - October 2017 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| [security-announce] SUSE-SU-2017:0490-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| www.securityfocus.com/bid/92630 | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| SWEET32 : triple-DES should now be considered as “bad” as RC4. · Issue #387 · ssllabs/ssllabs-scan · GitHub | af854a3a-2127-422b-91ae-364da2661108 | github.com | Third Party Advisory |
| Bugtraq | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| IBM Informix Dynamic Server / Informix Open Admin Tool - DLL Injection / Remote Code Execution / Heap Buffer Overflow - Windows webapps Exploit | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | Third Party Advisory, VDB Entry |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| OpenSSL 3DES Cipher Block Collision Weakness Lets Remote Users Decrypt Data in Certain Cases - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| [security-announce] openSUSE-SU-2016:2537-1: important: Security update for compat-openssl098 - openSUSE Security Announce - openSUSE Mailing Lists | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Oracle Critical Patch Update - January 2018 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| [security-announce] SUSE-SU-2016:2470-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| [security-announce] SUSE-SU-2017:2699-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| MySupport - Micro Focus Software Support | af854a3a-2127-422b-91ae-364da2661108 | softwaresupport.softwaregrp.com | Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| [security-announce] openSUSE-SU-2017:0374-1: important: Security update | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| [R1] LCE 4.8.2 Fixes Multiple Third-party Library Vulnerabilities - Security Advisory | Tenable Network Security | af854a3a-2127-422b-91ae-364da2661108 | www.tenable.com | Third Party Advisory |
| McAfee Security Bulletin - Sweet32 vulnerability (CVE-2016-2183) | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | Third Party Advisory |
| Accepted papers | ACM CCS 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.sigsac.org | Third Party Advisory |
| [security-announce] openSUSE-SU-2016:2391-1: important: Security update | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Oracle Critical Patch Update - April 2018 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| Oracle JRE/JDK: Multiple vulnerabilities (GLSA 201701-65) — Gentoo Security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| IBM Security Bulletin: Vulnerabilities in OpenSSL, OpenVPN and GNU glibc affect IBM Security Virtual Server Protection for VMware - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| USN-3198-1: OpenJDK 6 vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| USN-3194-1: OpenJDK 7 vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| USN-3372-1: NSS vulnerability | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| Oracle Linux Bulletin - October 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Knowledge Center | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | Third Party Advisory |
| [security-announce] SUSE-SU-2017:0346-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf | af854a3a-2127-422b-91ae-364da2661108 | cert-portal.siemens.com | |
| Security Advisory - Sixteen OpenSSL Vulnerabilities on Some Huawei products | af854a3a-2127-422b-91ae-364da2661108 | www.huawei.com | Third Party Advisory |
| [security-announce] openSUSE-SU-2017:0513-1: important: Security update | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Oracle Critical Patch Update - July 2017 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| [R2] PVS 5.2.0 Fixes Multiple Third-party Library Vulnerabilities - Security Advisory | Tenable Network Security | af854a3a-2127-422b-91ae-364da2661108 | www.tenable.com | Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| HPE Support document - HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| [R5] Nessus 6.9 Fixes Multiple Vulnerabilities - Security Advisory | Tenable Network Security | af854a3a-2127-422b-91ae-364da2661108 | www.tenable.com | Third Party Advisory |
| USN-3270-1: NSS vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| CVE-2016-2183 TLS Protocol 64-bit Cipher Vulnerability in Multiple NetApp Products | NetApp Product Security | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | Third Party Advisory |
| Oracle Critical Patch Update Advisory - January 2020 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| [security-announce] SUSE-SU-2017:0460-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Oracle Critical Patch Update Advisory - July 2020 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Attack of the week: 64-bit ciphers in TLS – A Few Thoughts on Cryptographic Engineering | af854a3a-2127-422b-91ae-364da2661108 | blog.cryptographyengineering.com | Press/Media Coverage, Technical Description, Third Party Advisory |
| [TLS] RC4+3DES rekeying - long-lived TLS connections | af854a3a-2127-422b-91ae-364da2661108 | www.ietf.org | Mailing List, Third Party Advisory |
| SeaCat Application Security Technology Is Not Impacted by the SWEET32 Issue (CVE-2016-2183) · TeskaLabs Blog | af854a3a-2127-422b-91ae-364da2661108 | www.teskalabs.com | Third Party Advisory |
| RETIRED: Oracle Java SE CVE-2016-2183 Remote Security Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Splunk Enterprise 6.5.1 addresses multiple OpenSSL vulnerabilities | Splunk | af854a3a-2127-422b-91ae-364da2661108 | www.splunk.com | Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| Red Hat Customer Portal - Access to 24x7 support and knowledge | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal - Access to 24x7 support and knowledge | MITRE | access.redhat.com | |
| Red Hat Customer Portal - Access to 24x7 support and knowledge | MITRE | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 376056 IBM Cognos Analytics Multiple Vulnerabilities (566643)
- 378985 Birthday attacks against Transport Layer Security (TLS) ciphers with 64bit block size Vulnerability (Sweet32)
- 390226 Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2021-0011)
- 390284 Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)
- 591093 ABB Relion 650, Relion 670 Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (ABB-VU-PGGA-1MRG024369) (ABB-VU-PGGA-1MRG025160)
- 591186 Mitsubishi Electric Air Conditioning Systems Multiple Vulnerabilities (ICSA-22-160-01)
- 591280 Siemens SCALANCE X-200RNA Switch Devices Denial of Service (DoS) Multiple Vulnerabilities (ICSA-22-349-21, SSA-412672)
- 671073 EulerOS Security Update for Open Secure Sockets Layer098e (OpenSSL098e) (EulerOS-SA-2019-2643)
- 671109 EulerOS Security Update for Open Secure Sockets Layer098e (OpenSSL098e) (EulerOS-SA-2019-2509)
- 710328 Gentoo Linux Oracle Java Runtime Error/Java Development Toolkit Multiple Vulnerabilities (GLSA 201701-65)
- 710425 Gentoo Linux IcedTea Multiple Vulnerabilities (GLSA 201707-01)