Description
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.
Published: 2021-11-11
Score: 7.5 High
EPSS: 14.7% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 Aug 2025 10:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:f5:f5os-a:1.3.0:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-a:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_analytics:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_security_manager:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_edge_gateway:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_fraud_protection_service:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_global_traffic_manager:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_link_controller:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_webaccelerator:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_websafe:17.5.0:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-a:1.8.0:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-c:1.8.0:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-c:1.8.1:*:*:*:*:*:*:*

Tue, 15 Apr 2025 14:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:f5:f5os-a:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:f5os-a:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:f5os-c:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:f5os-c:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:f5os-c:1.5.1:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-a:1.3.0:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-a:1.3.1:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-c:1.5.0:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-c:1.5.1:*:*:*:*:*:*:*

Subscriptions

Balasys Dheater
F5 Big-ip Access Policy Manager Big-ip Advanced Firewall Manager Big-ip Advanced Web Application Firewall Big-ip Analytics Big-ip Application Acceleration Manager Big-ip Application Security Manager Big-ip Application Visibility And Reporting Big-ip Carrier-grade Nat Big-ip Ddos Hybrid Defender Big-ip Domain Name System Big-ip Edge Gateway Big-ip Fraud Protection Service Big-ip Global Traffic Manager Big-ip Link Controller Big-ip Local Traffic Manager Big-ip Policy Enforcement Manager Big-ip Service Proxy Big-ip Ssl Orchestrator Big-ip Webaccelerator Big-ip Websafe Big-iq Centralized Management F5os-a F5os-c Traffix Signaling Delivery Controller
Hpe Aruba Cx 4100i Aruba Cx 6100 Aruba Cx 6200f Aruba Cx 6200m Aruba Cx 6300f Aruba Cx 6300m Aruba Cx 6405 Aruba Cx 6410 Aruba Cx 8320 Aruba Cx 8325-32c Aruba Cx 8325-48y8c Aruba Cx 8360-12c Aruba Cx 8360-16y2c Aruba Cx 8360-24xf2c Aruba Cx 8360-32y4c Aruba Cx 8360-48xt4c Aruba Cx 8360-48y6c Aruba Cx 8400 Arubaos-cx
Siemens Scalance W1750d Scalance W1750d Firmware
Stormshield Stormshield Management Center Stormshield Network Security
Suse Linux Enterprise Server
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-13T16:27:06.803Z

Reserved: 2021-11-11T00:00:00.000Z

Link: CVE-2002-20001

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-11-11T19:15:07.380

Modified: 2025-08-22T10:33:16.873

Link: CVE-2002-20001

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses