Description
IBM Domino 9.0.1 Fix Pack 3 Interim Fix 2 through 9.0.1 Fix Pack 5 Interim Fix 1, when using TLS and AES GCM, uses random nonce generation, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack." NOTE: this CVE has been incorrectly used for GCM nonce reuse issues in other products; see CVE-2016-10213 for the A10 issue, CVE-2016-10212 for the Radware issue, and CVE-2017-5933 for the Citrix issue.
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/96062
Mitigation, Patch, Vendor Advisory x_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21979604
Third Party Advisory x_refsource_misc
https://github.com/nonce-disrespect/nonce-disrespect
Mitigation, Patch, Vendor Advisory x_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21979673
Vendor Advisory x_refsource_confirm
https://support.citrix.com/article/CTX220329
Mitigation, Patch, Vendor Advisory x_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21979669
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1037795
Scores
CVSS v3
5.9
EPSS
0.0054
EPSS Percentile
67.6%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-200
Status
published
Products (7)
ibm/client_application_access
1.0.0.1
ibm/domino
9.0.1.3
ibm/domino
9.0.1.4
ibm/domino
9.0.1.5
ibm/notes
9.0.1.3
ibm/notes
9.0.1.4
ibm/notes
9.0.1.5
Published
Feb 08, 2017
Tracked Since
Feb 18, 2026