{"id":"CVE-2017-13099","details":"wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as \"ROBOT.\"","modified":"2026-04-10T03:55:18.556566Z","published":"2017-12-13T01:29:00.343Z","references":[{"type":"ADVISORY","url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-002.txt"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-464260.pdf"},{"type":"REPORT","url":"http://www.kb.cert.org/vuls/id/144389"},{"type":"REPORT","url":"http://www.securityfocus.com/bid/102174"},{"type":"REPORT","url":"https://robotattack.org/"},{"type":"FIX","url":"https://github.com/wolfSSL/wolfssl/pull/1229"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wolfSSL/wolfssl","events":[{"introduced":"0"},{"fixed":"182028819d5d1b3beeea15a3f3117a06608b62b0"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.12.2"}]}}],"versions":["v0.5","v1.8.8.0","v1.9.0","v2.0.2","v2.0.3","v2.0.6","v2.0.8","v2.0rc1","v2.0rc2","v2.0rc2b","v2.0rc3","v2.4.2","v2.4.6","v2.4.7","v2.6.0","v2.6.2","v2.7.0","v2.7.2","v2.8.0","v2.8.2","v2.8.3","v2.8.4","v2.8.5","v2.8.5a","v2.8.6","v2.9.0","v2.9.1","v2.9.2","v2.9.4","v3.10.0-stable","v3.10.0a","v3.10.2-stable","v3.10.3","v3.11.0-stable","v3.11.1-tls13-beta","v3.12.0-stable","v3.2.0","v3.2.4","v3.2.6","v3.3.0","v3.3.3","v3.4.0","v3.4.2","v3.4.6","v3.6.8","v3.6.9","v3.7.0","v3.7.1","v3.7.3","v3.8.0","v3.9.0","v3.9.1","v3.9.10-stable","v3.9.10b","v3.9.6","v3.9.6w","v3.9.8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-13099.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"8.3.0.1"}]},{"events":[{"introduced":"0"},{"fixed":"6.5.4.6"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}