Vulnerability Details CVE-2017-13098
BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as "ROBOT."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.763
EPSS Ranking 98.9%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 4.3
Products affected by CVE-2017-13098
-
cpe:2.3:a:bouncycastle:bc-java:-
-
cpe:2.3:a:bouncycastle:bc-java:1.01
-
cpe:2.3:a:bouncycastle:bc-java:1.02
-
cpe:2.3:a:bouncycastle:bc-java:1.03
-
cpe:2.3:a:bouncycastle:bc-java:1.04
-
cpe:2.3:a:bouncycastle:bc-java:1.05
-
cpe:2.3:a:bouncycastle:bc-java:1.06
-
cpe:2.3:a:bouncycastle:bc-java:1.07
-
cpe:2.3:a:bouncycastle:bc-java:1.08
-
cpe:2.3:a:bouncycastle:bc-java:1.09
-
cpe:2.3:a:bouncycastle:bc-java:1.10
-
cpe:2.3:a:bouncycastle:bc-java:1.11
-
cpe:2.3:a:bouncycastle:bc-java:1.12
-
cpe:2.3:a:bouncycastle:bc-java:1.13
-
cpe:2.3:a:bouncycastle:bc-java:1.14
-
cpe:2.3:a:bouncycastle:bc-java:1.15
-
cpe:2.3:a:bouncycastle:bc-java:1.16
-
cpe:2.3:a:bouncycastle:bc-java:1.17
-
cpe:2.3:a:bouncycastle:bc-java:1.18
-
cpe:2.3:a:bouncycastle:bc-java:1.19
-
cpe:2.3:a:bouncycastle:bc-java:1.20
-
cpe:2.3:a:bouncycastle:bc-java:1.21
-
cpe:2.3:a:bouncycastle:bc-java:1.22
-
cpe:2.3:a:bouncycastle:bc-java:1.23
-
cpe:2.3:a:bouncycastle:bc-java:1.24
-
cpe:2.3:a:bouncycastle:bc-java:1.25
-
cpe:2.3:a:bouncycastle:bc-java:1.26
-
cpe:2.3:a:bouncycastle:bc-java:1.27
-
cpe:2.3:a:bouncycastle:bc-java:1.28
-
cpe:2.3:a:bouncycastle:bc-java:1.29
-
cpe:2.3:a:bouncycastle:bc-java:1.30
-
cpe:2.3:a:bouncycastle:bc-java:1.31
-
cpe:2.3:a:bouncycastle:bc-java:1.32
-
cpe:2.3:a:bouncycastle:bc-java:1.33
-
cpe:2.3:a:bouncycastle:bc-java:1.34
-
cpe:2.3:a:bouncycastle:bc-java:1.35
-
cpe:2.3:a:bouncycastle:bc-java:1.36
-
cpe:2.3:a:bouncycastle:bc-java:1.37
-
cpe:2.3:a:bouncycastle:bc-java:1.38
-
cpe:2.3:a:bouncycastle:bc-java:1.39
-
cpe:2.3:a:bouncycastle:bc-java:1.40
-
cpe:2.3:a:bouncycastle:bc-java:1.41
-
cpe:2.3:a:bouncycastle:bc-java:1.42
-
cpe:2.3:a:bouncycastle:bc-java:1.43
-
cpe:2.3:a:bouncycastle:bc-java:1.44
-
cpe:2.3:a:bouncycastle:bc-java:1.45
-
cpe:2.3:a:bouncycastle:bc-java:1.46
-
cpe:2.3:a:bouncycastle:bc-java:1.47
-
cpe:2.3:a:bouncycastle:bc-java:1.48
-
cpe:2.3:a:bouncycastle:bc-java:1.49
-
cpe:2.3:a:bouncycastle:bc-java:1.50
-
cpe:2.3:a:bouncycastle:bc-java:1.51
-
cpe:2.3:a:bouncycastle:bc-java:1.52
-
cpe:2.3:a:bouncycastle:bc-java:1.53
-
cpe:2.3:a:bouncycastle:bc-java:1.54
-
cpe:2.3:a:bouncycastle:bc-java:1.55
-
cpe:2.3:a:bouncycastle:bc-java:1.56
-
cpe:2.3:a:bouncycastle:bc-java:1.57
-
cpe:2.3:a:bouncycastle:bc-java:1.58