CVE

CVE-2014-0224 - OpenSSL ‘ChangeCipherSpec’ MiTM Vulnerability

Examples

$ nmap --script ssl-ccs-injection -p 443 10.10.10.1

Starting Nmap 7.60 ( https://nmap.org ) at 2021-02-03 09:20 CET
Nmap scan report for 10.10.10.1
Host is up (0.0018s latency).

PORT    STATE SERVICE
443/tcp open  https
| ssl-ccs-injection: 
|   VULNERABLE:
|   SSL/TLS MITM vulnerability (CCS Injection)
|     State: VU[color=red][b]VULNERABLE[/b][/color]     Risk factor: High
|       OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h
|       does not properly restrict processing of ChangeCipherSpec messages,
|       which allows man-in-the-middle attackers to trigger use of a zero
|       length master key in certain OpenSSL-to-OpenSSL communications, and
|       consequently hijack sessions or obtain sensitive information, via
|       a crafted TLS handshake, aka the "CCS Injection" vulnerability.
|           
|     References:
|       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
|       http://www.cvedetails.com/cve/2014-0224
|_      http://www.openssl.org/news/secadv_20140605.txt

Nmap done: 1 IP address (1 host up) scanned in 0.30 seconds

URL list