CVE Vulnerabilities

CVE-2019-17023

Improper Authentication

Published: Jan 08, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
5.3 LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla*72.0 (excluding)
Red Hat Enterprise Linux 7RedHatnspr-0:4.25.0-2.el7_9*
Red Hat Enterprise Linux 7RedHatnss-0:3.53.1-3.el7_9*
Red Hat Enterprise Linux 7RedHatnss-softokn-0:3.53.1-6.el7_9*
Red Hat Enterprise Linux 7RedHatnss-util-0:3.53.1-1.el7_9*
Red Hat Enterprise Linux 8RedHatnspr-0:4.25.0-2.el8_2*
Red Hat Enterprise Linux 8RedHatnss-0:3.53.1-11.el8_2*
Red Hat OpenShift DoRedHatopenshiftdo/odo-init-image-rhel7:1.1.3-2*
FirefoxUbuntubionic*
FirefoxUbuntudevel*
FirefoxUbuntudisco*
FirefoxUbuntueoan*
FirefoxUbuntufocal*
FirefoxUbuntutrusty*
FirefoxUbuntuupstream*
FirefoxUbuntuxenial*
NssUbuntubionic*
NssUbuntudisco*
NssUbuntueoan*
NssUbuntuesm-infra/bionic*
NssUbuntutrusty*
NssUbuntuupstream*

Potential Mitigations

References