RULE(RULE ID:711066)

Rule General Information
Release Date: 2016-11-29
Rule Name: PROTOCOL-SSL Openssl RSA Downgrade Weak Encryption Vulnerability -25 (CVE-2015-0204)
Severity:
CVE ID:
Rule Protection Details
Description: The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.
Impact: An attacker can conduct RSA-to-EXPORT_RSA downgrade attacks which allows a man-in-the-middle attacker to impact the negotiation and downgrade connections from a strong cipher to an export-grade cipher, thus making the cipher more suceptible to hackers.
Affected OS: Solaris, FreeBSD, Windows, Linux, Other Unix, Mac OS
Reference: SecurityFocusBID:71936
SecurityFocusBID:91787
SecurityTrackerID:1033378
Solutions
The vendor has updated advisory on its official website. Please check it for more information.