CVE-2020-1596: TLS Information Disclosure Vulnerability

Overview

Severity
Medium (CVSS 5.4)
CVSS Vector
CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C
Category
Information Disclosure
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2020-Sep
Released
2020-09-08
Last Updated
2020-12-08
EPSS Score
0.18% (percentile: 39.1%)

Description

A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise a users's encrypted transmission channel. To exploit the vulnerability, an attacker would have to conduct a man-in-the-middle attack. The update addresses the vulnerability by correcting how TLS components use hash algorithms.

FAQ

What type of information disclosure does the CVE address? This CVE addresses protocol limitations associated with TLS_DHE ephemeral key reusage which can lead to key disclosure. Are there any advice regarding using TLS_DHE keys? The industry has mostly stopped using TLS_DHE. Microsoft advises customers to disable TLS_DHE .

Affected Products (44)

Other

  • 11497
  • 11498
  • 11563
  • 11568
  • 11569
  • 11570
  • 11571
  • 11572
  • 11712
  • 11713
  • 11714
  • 11715
  • 11453
  • 11454
  • 11583
  • 11644
  • 11645
  • 11646
  • 11647
  • 11766
  • 11767
  • 11768
  • 11769
  • 10729
  • 10735
  • 10852
  • 10853
  • 10816
  • 10855
  • 10047
  • 10048
  • 10481
  • 10482
  • 10484
  • 9312
  • 10287
  • 9318
  • 9344
  • 10051
  • 10049
  • 10378
  • 10379
  • 10483
  • 10543

Security Updates (15)

Acknowledgments

Robert Merget (Ruhr University Bochum), Marcus Brinkmann (Ruhr University Bochum), Nimrod Aviram (Tel Aviv University), Juraj Somorovsky (Paderborn University)

Revision History

  • 2020-09-08: Information published.
  • 2020-12-08: To address a known issue customers running Windows Server 2008 experienced after installing the September 2020 security updates, Microsoft has released the December 2020 Monthly Rollup and Security Only updates for all affected versions of Windows Server 2008. Microsoft strongly recommends that customers enrolled in the Extended Security Update (ESU) program install the updates to correct this known issue.