In December 2017, CERT Coordination Center (CERT/CC) released Vulnerability Note VU#144389  to report potential new TLS exposures for a variety of vendors to a variant of Hanno Böck’s Bleichenbacher Oracle vulnerability. This vulnerability is referred to as ROBOT (Return Of Bleichenbacher's Oracle Threat) .
A10 Networks products and ACOS are not affected by the TLS ROBOT vulnerability. However, some vulnerability scanning and detection tools, including the Proof-of-Concept (PoC) robot-detect script , may generate false positive reports for TLS ROBOT when tested against certain ACOS systems.
This false-positive is due to a behavior of ACOS for systems, with 3rd-generation SSL/TLS hardware solutions, being misinterpreted by these tools as a valid detection of the vulnerability. A10 Networks addresses such false reports as described in this document.
|Item #||Vulnerability ID||Score Source||Score||Summary|
|1||A10-2017-0009||CVSS 3.0||0.0 Low||TLS: ROBOT False Positive Reports|
(a) A10 Networks assigned identifier.
The table below indicates releases of ACOS potentially affected by these false-positives and ACOS releases that address them. ACOS release families not indicated below are not prone to such reports.
Customers using affected ACOS releases can overcome such false reports by updating to the indicated resolved release. If the table does not list a corresponding resolved or unaffected release, then no ACOS release update is currently available.
|Releases Affected||Releases Resolved or Unaffected|
4.1.4 – 4.1.4-P1
4.1.2 – 4.1.2-P4
4.1.1 – 4.1.1-P8
Software updates that address these vulnerabilities are or will be published at the following URL:
The following table shares brief descriptions of the vulnerabilities addressed in this document.
|Vulnerability ID||Vulnerability Description|
TLS implementations may disclose side channel information via discrepancies between valid and invalid PKCS#1 padding and may therefore be vulnerable to Bleichenbacher-style attacks. This attack is known as a "ROBOT attack".
Apply an update - Some products may have software updates available to address this issue. If an update is available, affected users are encouraged to update product software or firmware. Please see the Affected Vendors list below for more information.
July 29, 2018
© Copyright 2018 A10 Networks, Inc. All Rights Reserved.
This document is provided on an "AS IS" basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability, non-infringement or fitness for a particular use. Your use of the information in this document or materials linked from this document is at your own risk. A10 Networks, Inc. reserves the right to change or update the information in this document at any time.