{"api_version":"1","generated_at":"2026-05-16T23:21:35+00:00","cve":"CVE-2024-41996","urls":{"html":"https://cve.report/CVE-2024-41996","api":"https://cve.report/api/cve/CVE-2024-41996.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-41996","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-41996"},"summary":{"title":"CVE-2024-41996","description":"Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.","state":"PUBLISHED","assigner":"mitre","published_at":"2024-08-26 06:15:04","updated_at":"2026-05-12 12:17:03"},"problem_types":["CWE-295","n/a","CWE-295 CWE-295 Improper Certificate Validation"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-089022.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-089022.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://dheatattack.gitlab.io/details/","name":"https://dheatattack.gitlab.io/details/","refsource":"cve@mitre.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1","name":"https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1","refsource":"cve@mitre.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://dheatattack.gitlab.io/faq/","name":"https://dheatattack.gitlab.io/faq/","refsource":"cve@mitre.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-485750.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-485750.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-41996","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41996","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]},{"source":"ADP","vendor":"diffie-hellman_key_exchange_project","product":"diffie-hellman_key_exchange","version":"affected * custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"RUGGEDCOM RST2428P","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XCH328","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XCM324","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XCM328","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XCM332","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRH334 (24 V DC, 8xFO, CC)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (230 V AC, 12xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (230 V AC, 8xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (24 V DC, 12xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (24 V DC, 8xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (2x230 V AC, 12xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (2x230 V AC, 8xFO)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+)","version":"affected V3.3 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIDIS Prime","version":"affected V4.0.800 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","version":"affected * custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2024","cve_id":"41996","cve":"CVE-2024-41996","epss":"0.006280000","percentile":"0.703590000","score_date":"2026-05-12","updated_at":"2026-05-13 00:11:53"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"affected":[{"cpes":["cpe:2.3:a:diffie-hellman_key_exchange_project:diffie-hellman_key_exchange:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"diffie-hellman_key_exchange","vendor":"diffie-hellman_key_exchange_project","versions":[{"lessThanOrEqual":"*","status":"affected","version":"0","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2024-41996","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2024-08-26T15:15:18.339789Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-295","description":"CWE-295 Improper Certificate Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2024-08-26T15:17:29.404Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"affected":[{"defaultStatus":"unknown","product":"RUGGEDCOM RST2428P","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XCH328","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XCM324","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XCM328","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XCM332","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRH334 (24 V DC, 8xFO, CC)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (230 V AC, 12xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (230 V AC, 8xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (24 V DC, 12xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (24 V DC, 8xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (2x230 V AC, 12xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (2x230 V AC, 8xFO)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+)","vendor":"Siemens","versions":[{"lessThan":"V3.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIDIS Prime","vendor":"Siemens","versions":[{"lessThan":"V4.0.800","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","vendor":"Siemens","versions":[{"lessThan":"*","status":"affected","version":"0","versionType":"custom"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T11:56:15.083Z","orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP"},"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-089022.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-485750.html"}],"x_adpType":"supplier"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2024-08-26T05:59:37.163Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"url":"https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1"},{"url":"https://dheatattack.gitlab.io/details/"},{"url":"https://dheatattack.gitlab.io/faq/"}]}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2024-41996","datePublished":"2024-08-26T00:00:00.000Z","dateReserved":"2024-07-26T00:00:00.000Z","dateUpdated":"2026-05-12T11:56:15.083Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-08-26 06:15:04","lastModifiedDate":"2026-05-12 12:17:03","problem_types":["CWE-295","n/a","CWE-295 CWE-295 Improper Certificate Validation"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"41996","Ordinal":"1","Title":"CVE-2024-41996","CVE":"CVE-2024-41996","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"41996","Ordinal":"1","NoteData":"Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.","Type":"Description","Title":"CVE-2024-41996"}]}}}