CVE-2020-13777

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-13777
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13777.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-13777
Downstream
Related
Published
2020-06-04T07:15:10Z
Modified
2025-10-21T05:32:01.985484Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.

References

Affected packages

Git / github.com/gnutls/gnutls

Affected ranges

Type
GIT
Repo
https://github.com/gnutls/gnutls
Events

Affected versions

3.*

3.6.12
3.6.13
3.6.14

Other

gnutls_3_6_0
gnutls_3_6_0_1
gnutls_3_6_1
gnutls_3_6_10
gnutls_3_6_11
gnutls_3_6_11_1
gnutls_3_6_12
gnutls_3_6_2
gnutls_3_6_3
gnutls_3_6_4
gnutls_3_6_5
gnutls_3_6_6
gnutls_3_6_7
gnutls_3_6_9