Blue Coat ProxySG 6.5.x / 6.2.x / 5.5 OpenSSL Vulnerability (FREAK)

medium Nessus Plugin ID 82663

Synopsis

The remote device is affected by a security feature bypass vulnerability.

Description

The remote Blue Coat ProxySG device's self-reported SGOS version is 6.5 prior to 6.5.6.2, or version 6.2 prior to 6.2.16.3, or else any version of 5.5. Therefore, it contains a bundled version of OpenSSL affected by a security feature bypass vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys), due to the support of weak EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic.

Solution

Upgrade to version 6.2.16.3 / 6.5.6.2 or later

See Also

https://bto.bluecoat.com/security-advisory/sa91

https://www.smacktls.com/#freak

Plugin Details

Severity: Medium

ID: 82663

File Name: bluecoat_proxy_sg_6_5_6_2.nasl

Version: 1.8

Type: local

Family: Firewalls

Published: 4/9/2015

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.5

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/o:bluecoat:sgos

Required KB Items: Host/BlueCoat/ProxySG/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/18/2015

Vulnerability Publication Date: 1/6/2015

Reference Information

CVE: CVE-2015-0204

BID: 71936

CERT: 243585