Vulnerability & Exploit Database

Back to search

Scanner for Bleichenbacher Oracle in RSA PKCS #1 v1.5

Some TLS implementations handle errors processing RSA key exchanges and encryption (PKCS #1 v1.5 messages) in a broken way that leads an adaptive chosen-chiphertext attack. Attackers cannot recover a server's private key, but they can decrypt and sign messages with it. A strong oracle occurs when the TLS server does not strictly check message formatting and needs less than a million requests on average to decode a given ciphertext. A weak oracle server strictly checks message formatting and often requires many more requests to perform the attack. This module requires Python 3 with the gmpy2 and cryptography packages to be present.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name



  • Hanno Böck
  • Juraj Somorovsky
  • Craig Young
  • Daniel Bleichenbacher
  • Adam Cammack <adam_cammack[AT]>




Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/scanner/ssl/bleichenbacher_oracle msf auxiliary(bleichenbacher_oracle) > show actions ...actions... msf auxiliary(bleichenbacher_oracle) > set ACTION <action-name> msf auxiliary(bleichenbacher_oracle) > show options and set options... msf auxiliary(bleichenbacher_oracle) > run

Related Vulnerabilities