CVE Vulnerabilities

CVE-2013-2566

Inadequate Encryption Strength

Published: Mar 15, 2013 | Modified: Apr 11, 2025
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.

Weakness

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Affected Software

NameVendorStart VersionEnd Version
Communications_application_session_controllerOracle3.0.0 (including)3.9.1 (including)
Http_serverOracle11.1.1.7.0 (including)11.1.1.7.0 (including)
Http_serverOracle11.1.1.9.0 (including)11.1.1.9.0 (including)
Http_serverOracle12.1.3.0.0 (including)12.1.3.0.0 (including)
Http_serverOracle12.2.1.1.0 (including)12.2.1.1.0 (including)
Http_serverOracle12.2.1.2.0 (including)12.2.1.2.0 (including)
Integrated_lights_out_manager_firmwareOracle3.0.0 (including)3.2.11 (including)
Integrated_lights_out_manager_firmwareOracle4.0.0 (including)4.0.4 (including)
FirefoxUbuntulucid*
FirefoxUbuntuprecise*
FirefoxUbuntuquantal*
FirefoxUbunturaring*
FirefoxUbuntusaucy*
FirefoxUbuntuupstream*
OpensslUbuntudevel*
OpensslUbuntuhardy*
OpensslUbuntulucid*
OpensslUbuntuoneiric*
OpensslUbuntuprecise*
OpensslUbuntuquantal*
OpensslUbunturaring*
OpensslUbuntusaucy*
ThunderbirdUbuntudevel*
ThunderbirdUbuntulucid*
ThunderbirdUbuntuprecise*
ThunderbirdUbuntuquantal*
ThunderbirdUbunturaring*
ThunderbirdUbuntusaucy*
ThunderbirdUbuntuupstream*

Potential Mitigations

References