vulnerability

Red Hat: CVE-2020-13777: CVE-2020-13777 gnutls: session resumption works without master key allowing MITM (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Jun 4, 2020
Added
Jun 23, 2020
Modified
Aug 11, 2025

Description

GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.

Solutions

redhat-upgrade-gnutlsredhat-upgrade-gnutls-credhat-upgrade-gnutls-c-debuginforedhat-upgrade-gnutls-daneredhat-upgrade-gnutls-dane-debuginforedhat-upgrade-gnutls-debuginforedhat-upgrade-gnutls-debugsourceredhat-upgrade-gnutls-develredhat-upgrade-gnutls-utilsredhat-upgrade-gnutls-utils-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.