The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Balasys
Subscribe
|
Dheater
Subscribe
|
|
F5
Subscribe
|
Big-ip Access Policy Manager
Subscribe
Big-ip Advanced Firewall Manager
Subscribe
Big-ip Advanced Web Application Firewall
Subscribe
Big-ip Analytics
Subscribe
Big-ip Application Acceleration Manager
Subscribe
Big-ip Application Security Manager
Subscribe
Big-ip Application Visibility And Reporting
Subscribe
Big-ip Carrier-grade Nat
Subscribe
Big-ip Ddos Hybrid Defender
Subscribe
Big-ip Domain Name System
Subscribe
Big-ip Edge Gateway
Subscribe
Big-ip Fraud Protection Service
Subscribe
Big-ip Global Traffic Manager
Subscribe
Big-ip Link Controller
Subscribe
Big-ip Local Traffic Manager
Subscribe
Big-ip Policy Enforcement Manager
Subscribe
Big-ip Service Proxy
Subscribe
Big-ip Ssl Orchestrator
Subscribe
Big-ip Webaccelerator
Subscribe
Big-ip Websafe
Subscribe
Big-iq Centralized Management
Subscribe
F5os-a
Subscribe
F5os-c
Subscribe
Traffix Signaling Delivery Controller
Subscribe
|
|
Hpe
Subscribe
|
Aruba Cx 4100i
Subscribe
Aruba Cx 6100
Subscribe
Aruba Cx 6200f
Subscribe
Aruba Cx 6200m
Subscribe
Aruba Cx 6300f
Subscribe
Aruba Cx 6300m
Subscribe
Aruba Cx 6405
Subscribe
Aruba Cx 6410
Subscribe
Aruba Cx 8320
Subscribe
Aruba Cx 8325-32c
Subscribe
Aruba Cx 8325-48y8c
Subscribe
Aruba Cx 8360-12c
Subscribe
Aruba Cx 8360-16y2c
Subscribe
Aruba Cx 8360-24xf2c
Subscribe
Aruba Cx 8360-32y4c
Subscribe
Aruba Cx 8360-48xt4c
Subscribe
Aruba Cx 8360-48y6c
Subscribe
Aruba Cx 8400
Subscribe
Arubaos-cx
Subscribe
|
|
Siemens
Subscribe
|
|
|
Stormshield
Subscribe
|
|
|
Suse
Subscribe
|
Linux Enterprise Server
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 22 Aug 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:f5:f5os-a:1.3.1:*:*:*:*:*:*:* |
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_analytics:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_security_manager:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_domain_name_system:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_edge_gateway:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_fraud_protection_service:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_global_traffic_manager:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_link_controller:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_local_traffic_manager:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_webaccelerator:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_websafe:17.5.0:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-a:1.8.0:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-c:1.8.0:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-c:1.8.1:*:*:*:*:*:*:* |
Tue, 15 Apr 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:f5:f5os-a:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:f5:f5os-c:*:*:*:*:*:*:*:* cpe:2.3:a:f5:f5os-c:1.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:f5os-c:1.5.1:*:*:*:*:*:*:* |
cpe:2.3:o:f5:f5os-a:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-a:1.3.1:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-c:1.5.0:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-c:1.5.1:*:*:*:*:*:*:* |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T16:27:06.803Z
Reserved: 2021-11-11T00:00:00.000Z
Link: CVE-2002-20001
No data.
Status : Analyzed
Published: 2021-11-11T19:15:07.380
Modified: 2025-08-22T10:33:16.873
Link: CVE-2002-20001
No data.
OpenCVE Enrichment
No data.
Weaknesses