CVE-2014-0224
HIGH EXPLOITEDSSL Labs API Client
Title source: metasploitDescription
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
Exploits (7)
nomisec
SCANNER
39 stars
by Tripwire · remote-auth
https://github.com/Tripwire/OpenSSL-CCS-Inject-Test
nomisec
WORKING POC
9 stars
by secretnonempty · remote-auth
https://github.com/secretnonempty/CVE-2014-0224
metasploit
SCANNER
by Masashi Kikuchi · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssl/openssl_ccs.rb
References (303)
... and 283 more
Scores
CVSS v3
7.4
EPSS
0.8979
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Details
VulnCheck KEV
2024-05-06
CWE
CWE-326
Status
published
Products (21)
fedoraproject/fedora
19
fedoraproject/fedora
20
filezilla-project/filezilla_server
< 0.9.45
mariadb/mariadb
10.0.0 - 10.0.13
nodejs/node.js
< 0.10.29
openssl/openssl
< 0.9.8za
opensuse/opensuse
13.1
opensuse/opensuse
13.2
python/python
2.7.0 - 2.7.8
redhat/enterprise_linux
4
... and 11 more
Published
Jun 05, 2014
Tracked Since
Feb 18, 2026