CVE-2014-0224
HIGH EXPLOITEDSSL Labs API Client
Title source: metasploitDescription
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
Exploits (7)
nomisec
SCANNER
39 stars
by Tripwire · remote-auth
https://github.com/Tripwire/OpenSSL-CCS-Inject-Test
nomisec
WORKING POC
9 stars
by secretnonempty · remote-auth
https://github.com/secretnonempty/CVE-2014-0224
metasploit
SCANNER
by Masashi Kikuchi · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssl/openssl_ccs.rb
References (303)
... and 283 more
Scores
CVSS v3
7.4
EPSS
0.9318
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Exploitation Intel
VulnCheck KEV
2024-05-06
Classification
CWE
CWE-326
Status
draft
Affected Products (21)
openssl/openssl
< 0.9.8za
redhat/jboss_enterprise_application_platform
redhat/jboss_enterprise_application_platform
redhat/jboss_enterprise_web_platform
redhat/jboss_enterprise_web_server
redhat/storage
fedoraproject/fedora
fedoraproject/fedora
opensuse/opensuse
opensuse/opensuse
redhat/enterprise_linux
redhat/enterprise_linux
redhat/enterprise_linux
filezilla-project/filezilla_server
< 0.9.45
siemens/application_processing_engine_firmware
< 2.0.2
... and 6 more
Timeline
Published
Jun 05, 2014
Tracked Since
Feb 18, 2026