Description
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.
Published: 2020-02-21
Score: 5.9 Medium
EPSS: 31.4% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.14648}

epss

{'score': 0.14659}


Subscriptions

F5 Arx Big-ip Access Policy Manager Big-ip Advanced Firewall Manager Big-ip Analytics Big-ip Application Acceleration Manager Big-ip Application Security Manager Big-ip Edge Gateway Big-ip Link Controller Big-ip Local Traffic Manager Big-ip Policy Enforcement Manager Big-ip Protocol Security Module Big-ip Wan Optimization Manager Big-ip Webaccelerator Firepass
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-06T16:14:56.365Z

Reserved: 2013-05-21T00:00:00.000Z

Link: CVE-2013-3587

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-21T18:15:11.427

Modified: 2024-11-21T01:53:56.283

Link: CVE-2013-3587

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-08-02T00:00:00Z

Links: CVE-2013-3587 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses