TLS Implementation Vulnerability in Unisys ClearPath MCP Systems
CVE-2018-5762

5.9MEDIUM

Key Information:

Vendor

Unisys

Vendor
CVE Published:
26 February 2018

What is CVE-2018-5762?

The TLS implementation in Unisys ClearPath MCP systems has a vulnerability that allows remote attackers to potentially decrypt TLS ciphertext data. This issue arises from a flaw in the TCP/IP networking module, which is susceptible to a Bleichenbacher RSA padding oracle attack, commonly referred to as a ROBOT attack. The affected versions of TCP-IP-SW include those prior to 58.160, 059.1a.17 (IC #17), and 60.044. This vulnerability emphasizes the need for timely updates and robust encryption practices.

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.