Skip to content

Critical OpenSSL Vulnerability CVE-2016-2107 Affects AES CBC and AES-NI Servers

A newly discovered OpenSSL flaw puts servers at risk. The grading criteria have changed, and prompt action is needed to protect your systems.

The image is of a notice board. There are few notes on the board.
The image is of a notice board. There are few notes on the board.

Critical OpenSSL Vulnerability CVE-2016-2107 Affects AES CBC and AES-NI Servers

A critical vulnerability in OpenSSL, identified as CVE-2016-2107, has been brought to light. This flaw, which can be exploited by a Man-in-the-Middle (MITM) attacker using a padding Oracle attack, affects connections that utilise the AES CBC cipher and servers supporting AES-NI. The discovery has led to an update in criteria and a change in grading standards for vulnerable servers.

The vulnerability, discovered by Filippo Valsorda, allows an attacker to decrypt traffic by exploiting a weakness in the padding process. This issue is particularly concerning as it affects a widely-used encryption method, AES CBC, and servers equipped with AES-NI, a set of instructions designed to speed up AES operations.

Previously, servers vulnerable to this attack were graded up to a C. However, in response to the severity of the issue, the grading criteria have been updated. From June 6, 2016, forward, any server found to be vulnerable will receive an F grade, reflecting the critical nature of the flaw. To address this vulnerability, an update to the grading criteria, version 2009m, has been released.

The OpenSSL vulnerability CVE-2016-2107 poses a significant risk to servers using AES CBC cipher and supporting AES-NI. With the grading criteria updated and the grading standards tightened, it is crucial for server administrators to address this issue promptly to maintain the security and integrity of their systems.

Read also:

Latest