CISA Known Exploited Vulnerability
This vulnerability is actively exploited in the wild and listed in the CISA Known Exploited Vulnerabilities catalog.
Remediation Deadline: May 25, 2022
Description
The TLS and DTLS implementations in OpenSSL do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information.
CVSS Score
7.5/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NEPSS — Exploit Probability
94.5%
Higher than 100.0% of all CVEs
Weakness Classification (CWE)
Known Exploits
POChttp://advisories.mageia.org/MGASA-2014-0165.htmlThird Party Advisoryhttp://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/Issue Trackinghttp://heartbleed.com/Third Party Advisoryhttp://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.htmlBroken Linkhttp://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.htmlBroken Linkhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlMailing Listhttp://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.htmlMailing Listhttp://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.htmlMailing Listhttp://lists.opensuse.org/opensuse-updates/2014-04/msg00061.htmlMailing Listhttp://marc.info/?l=bugtraq&m=139722163017074&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139757726426985&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139757819327350&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139757919027752&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139758572430452&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139765756720506&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139774054614965&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139774703817488&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139808058921905&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139817685517037&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139817727317190&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139817782017443&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139824923705461&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139824993005633&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139833395230364&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139835815211508&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139835844111589&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139836085512508&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139842151128341&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139843768401936&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139869720529462&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139869891830365&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139889113431619&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139889295732144&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905202427693&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905243827825&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905295427946&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905351928096&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905405728262&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905458328378&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905653828999&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905868529690&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=140015787404650&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=140075368411126&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=140724451518351&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=140752315422991&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=141287864628122&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=142660345230545&w=2Mailing Listhttp://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1Third Party Advisoryhttp://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3Permissions Requiredhttp://rhn.redhat.com/errata/RHSA-2014-0376.htmlThird Party Advisoryhttp://rhn.redhat.com/errata/RHSA-2014-0377.htmlThird Party Advisoryhttp://rhn.redhat.com/errata/RHSA-2014-0378.htmlThird Party Advisoryhttp://rhn.redhat.com/errata/RHSA-2014-0396.htmlThird Party Advisoryhttp://seclists.org/fulldisclosure/2014/Apr/109Mailing Listhttp://seclists.org/fulldisclosure/2014/Apr/173Mailing Listhttp://seclists.org/fulldisclosure/2014/Apr/190Mailing Listhttp://seclists.org/fulldisclosure/2014/Apr/90Mailing Listhttp://seclists.org/fulldisclosure/2014/Apr/91Mailing Listhttp://seclists.org/fulldisclosure/2014/Dec/23Mailing Listhttp://secunia.com/advisories/57347Broken Linkhttp://secunia.com/advisories/57483Broken Linkhttp://secunia.com/advisories/57721Broken Linkhttp://secunia.com/advisories/57836Broken Linkhttp://secunia.com/advisories/57966Broken Linkhttp://secunia.com/advisories/57968Broken Linkhttp://secunia.com/advisories/59139Broken Linkhttp://secunia.com/advisories/59243Broken Linkhttp://secunia.com/advisories/59347Broken Linkhttp://support.citrix.com/article/CTX140605Third Party Advisoryhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleedThird Party Advisoryhttp://www-01.ibm.com/support/docview.wss?uid=isg400001841Third Party Advisoryhttp://www-01.ibm.com/support/docview.wss?uid=isg400001843Third Party Advisoryhttp://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661Third Party Advisoryhttp://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdfBroken Linkhttp://www.debian.org/security/2014/dsa-2896Mailing Listhttp://www.exploit-db.com/exploits/32745Exploithttp://www.exploit-db.com/exploits/32764Exploithttp://www.f-secure.com/en/web/labs_global/fsc-2014-1Broken Linkhttp://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/Third Party Advisoryhttp://www.kb.cert.org/vuls/id/720951Third Party Advisoryhttp://www.kerio.com/support/kerio-control/release-historyBroken Linkhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:062Broken Linkhttp://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlPatchhttp://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.htmlPatchhttp://www.securityfocus.com/archive/1/534161/100/0/threadedBroken Linkhttp://www.securityfocus.com/bid/66690Broken Linkhttp://www.securitytracker.com/id/1030026Broken Linkhttp://www.securitytracker.com/id/1030074Broken Linkhttp://www.securitytracker.com/id/1030077Broken Linkhttp://www.securitytracker.com/id/1030078Broken Linkhttp://www.securitytracker.com/id/1030079Broken Linkhttp://www.securitytracker.com/id/1030080Broken Linkhttp://www.securitytracker.com/id/1030081Broken Linkhttp://www.securitytracker.com/id/1030082Broken Linkhttp://www.splunk.com/view/SP-CAAAMB3Third Party Advisoryhttp://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00Third Party Advisoryhttp://www.ubuntu.com/usn/USN-2165-1Third Party Advisoryhttp://www.us-cert.gov/ncas/alerts/TA14-098AThird Party Advisoryhttps://bugzilla.redhat.com/show_bug.cgi?id=1084875Issue Trackinghttps://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdfThird Party Advisoryhttps://gist.github.com/chapmajs/10473815Exploithttps://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3EMailing Listhttps://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3EMailing Listhttps://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3EMailing Listhttps://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3EMailing Listhttps://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.htmlMailing Listhttps://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.htmlExploithttps://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.htmlThird Party Advisoryhttps://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217Third Party Advisoryhttps://www.cert.fi/en/reports/2014/vulnerability788210.htmlNot Applicablehttps://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008Third Party Advisoryhttps://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bdBroken Linkhttp://advisories.mageia.org/MGASA-2014-0165.htmlThird Party Advisoryhttp://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/Issue Trackinghttp://heartbleed.com/Third Party Advisoryhttp://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.htmlBroken Linkhttp://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.htmlBroken Linkhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlMailing Listhttp://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.htmlMailing Listhttp://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.htmlMailing Listhttp://lists.opensuse.org/opensuse-updates/2014-04/msg00061.htmlMailing Listhttp://marc.info/?l=bugtraq&m=139722163017074&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139757726426985&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139757819327350&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139757919027752&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139758572430452&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139765756720506&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139774054614965&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139774703817488&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139808058921905&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139817685517037&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139817727317190&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139817782017443&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139824923705461&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139824993005633&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139833395230364&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139835815211508&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139835844111589&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139836085512508&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139842151128341&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139843768401936&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139869720529462&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139869891830365&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139889113431619&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139889295732144&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905202427693&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905243827825&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905295427946&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905351928096&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905405728262&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905458328378&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905653828999&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=139905868529690&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=140015787404650&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=140075368411126&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=140724451518351&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=140752315422991&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=141287864628122&w=2Mailing Listhttp://marc.info/?l=bugtraq&m=142660345230545&w=2Mailing Listhttp://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1Third Party Advisoryhttp://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3Permissions Requiredhttp://rhn.redhat.com/errata/RHSA-2014-0376.htmlThird Party Advisoryhttp://rhn.redhat.com/errata/RHSA-2014-0377.htmlThird Party Advisoryhttp://rhn.redhat.com/errata/RHSA-2014-0378.htmlThird Party Advisoryhttp://rhn.redhat.com/errata/RHSA-2014-0396.htmlThird Party Advisoryhttp://seclists.org/fulldisclosure/2014/Apr/109Mailing Listhttp://seclists.org/fulldisclosure/2014/Apr/173Mailing Listhttp://seclists.org/fulldisclosure/2014/Apr/190Mailing Listhttp://seclists.org/fulldisclosure/2014/Apr/90Mailing Listhttp://seclists.org/fulldisclosure/2014/Apr/91Mailing Listhttp://seclists.org/fulldisclosure/2014/Dec/23Mailing Listhttp://secunia.com/advisories/57347Broken Linkhttp://secunia.com/advisories/57483Broken Linkhttp://secunia.com/advisories/57721Broken Linkhttp://secunia.com/advisories/57836Broken Linkhttp://secunia.com/advisories/57966Broken Linkhttp://secunia.com/advisories/57968Broken Linkhttp://secunia.com/advisories/59139Broken Linkhttp://secunia.com/advisories/59243Broken Linkhttp://secunia.com/advisories/59347Broken Linkhttp://support.citrix.com/article/CTX140605Third Party Advisoryhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleedThird Party Advisoryhttp://www-01.ibm.com/support/docview.wss?uid=isg400001841Third Party Advisoryhttp://www-01.ibm.com/support/docview.wss?uid=isg400001843Third Party Advisoryhttp://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661Third Party Advisoryhttp://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdfBroken Linkhttp://www.debian.org/security/2014/dsa-2896Mailing Listhttp://www.exploit-db.com/exploits/32745Exploithttp://www.exploit-db.com/exploits/32764Exploithttp://www.f-secure.com/en/web/labs_global/fsc-2014-1Broken Linkhttp://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/Third Party Advisoryhttp://www.kb.cert.org/vuls/id/720951Third Party Advisoryhttp://www.kerio.com/support/kerio-control/release-historyBroken Linkhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:062Broken Linkhttp://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlPatchhttp://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.htmlPatchhttp://www.securityfocus.com/archive/1/534161/100/0/threadedBroken Linkhttp://www.securityfocus.com/bid/66690Broken Linkhttp://www.securitytracker.com/id/1030026Broken Linkhttp://www.securitytracker.com/id/1030074Broken Linkhttp://www.securitytracker.com/id/1030077Broken Linkhttp://www.securitytracker.com/id/1030078Broken Linkhttp://www.securitytracker.com/id/1030079Broken Linkhttp://www.securitytracker.com/id/1030080Broken Linkhttp://www.securitytracker.com/id/1030081Broken Linkhttp://www.securitytracker.com/id/1030082Broken Linkhttp://www.splunk.com/view/SP-CAAAMB3Third Party Advisoryhttp://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00Third Party Advisoryhttp://www.ubuntu.com/usn/USN-2165-1Third Party Advisoryhttp://www.us-cert.gov/ncas/alerts/TA14-098AThird Party Advisoryhttps://bugzilla.redhat.com/show_bug.cgi?id=1084875Issue Trackinghttps://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdfThird Party Advisoryhttps://gist.github.com/chapmajs/10473815Exploithttps://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3EMailing Listhttps://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3EMailing Listhttps://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3EMailing Listhttps://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3EMailing Listhttps://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.htmlMailing Listhttps://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.htmlExploithttps://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.htmlThird Party Advisoryhttps://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217Third Party Advisoryhttps://www.cert.fi/en/reports/2014/vulnerability788210.htmlNot Applicablehttps://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008Third Party Advisoryhttps://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bdBroken Link
Required Action
https://nvd.nist.gov/vuln/detail/CVE-2014-0160
Risk Assessment
CRITICALIn CISA KEV
Known exploit
High EPSS
Details
- Severity
- High
- CVSS
- 7.5
- EPSS
- 94.5%
- CWE
- CWE-125
- Exploit
- POC
- CISA KEV
- Yes
- Ransomware
- Unknown
- Articles
- 0
Timeline
Published
May 4, 2022
Added to KEV
May 4, 2022
Remediation Due
May 25, 2022