vulnerability
Red Hat: CVE-2019-17023: CVE-2019-17023 nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Jan 8, 2020 | Aug 4, 2020 | Mar 27, 2026 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Jan 8, 2020
Added
Aug 4, 2020
Modified
Mar 27, 2026
Description
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
Solutions
redhat-upgrade-nsprredhat-upgrade-nspr-debuginforedhat-upgrade-nspr-debugsourceredhat-upgrade-nspr-develredhat-upgrade-nssredhat-upgrade-nss-debuginforedhat-upgrade-nss-debugsourceredhat-upgrade-nss-develredhat-upgrade-nss-pkcs11-develredhat-upgrade-nss-softoknredhat-upgrade-nss-softokn-debuginforedhat-upgrade-nss-softokn-develredhat-upgrade-nss-softokn-freeblredhat-upgrade-nss-softokn-freebl-debuginforedhat-upgrade-nss-softokn-freebl-develredhat-upgrade-nss-sysinitredhat-upgrade-nss-sysinit-debuginforedhat-upgrade-nss-toolsredhat-upgrade-nss-tools-debuginforedhat-upgrade-nss-utilredhat-upgrade-nss-util-debuginforedhat-upgrade-nss-util-devel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.