The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
Vulnerable Systems:
* Cisco Content Security Management Appliance 9.6.6-068
* Cisco Content Security Management Appliance 9.7.0-006
* Openssl 1.0.1
* Openssl 1.0.2
* Openssl 1.1.0
* Python 2.7
* Python 3.3
* Python 3.4.0
* Python 3.5
* Python 3.6
* Redhat Enterprise Linux 5
* Redhat Enterprise Linux 6
* Redhat Enterprise Linux 7
* Redhat Jboss Enterprise Application Platform 6.0.0
* Redhat Jboss Enterprise Web Server 1.0.0
* Redhat Jboss Enterprise Web Server 2.0.0
* Redhat Jboss Web Server 3
The new vulnerability affects the 3DES block cipher. It can be found in software like OpenVPN, OpenSSL, Apache Server, etc. During an attack, attackers need to find a collision of any encrypted block of CBC data stream to decrypt the traffic between the victim and the server.
A successful attack requires the following prerequisites:
Long lasting connection that uses CBC mode of operation and 3DES or DES cipher
Control the victim s browser
Perform the attack for approximately two days
Capture at least hundreds 785 GB of traffic between the victim and the server (generated by malicious JavaScript code injected to victim s browser)