The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

Project Subscriptions

Vendors Products
Content Security Management Appliance Subscribe
Node.js Subscribe
Openssl Subscribe
Openssl Subscribe
Database Subscribe
Enterprise Linux Subscribe
Jboss Core Services Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Web Server Subscribe
Jboss Web Server Subscribe
Network Satellite Subscribe
Openshift Subscribe
Rhel Extras Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-637-1 openssl security update
Debian DSA Debian DSA DSA-3673-1 openssl security update
Ubuntu USN Ubuntu USN USN-3087-1 OpenSSL vulnerabilities
Ubuntu USN Ubuntu USN USN-3179-1 OpenJDK 8 vulnerabilities
Ubuntu USN Ubuntu USN USN-3194-1 OpenJDK 7 vulnerabilities
Ubuntu USN Ubuntu USN USN-3198-1 OpenJDK 6 vulnerabilities
Ubuntu USN Ubuntu USN USN-3270-1 NSS vulnerabilities
Ubuntu USN Ubuntu USN USN-3372-1 NSS vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html cve-icon cve-icon
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2017-0336.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2017-0337.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2017-0338.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2017-0462.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2017/Jul/31 cve-icon cve-icon
http://seclists.org/fulldisclosure/2017/May/105 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21991482 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3673 cve-icon cve-icon
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/539885/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/540341/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/541104/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/542005/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/92630 cve-icon cve-icon
http://www.securityfocus.com/bid/95568 cve-icon cve-icon
http://www.securitytracker.com/id/1036696 cve-icon cve-icon
http://www.splunk.com/view/SP-CAAAPSV cve-icon cve-icon
http://www.splunk.com/view/SP-CAAAPUE cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3087-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3087-2 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3179-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3194-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3198-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3270-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3372-1 cve-icon cve-icon
https://access.redhat.com/articles/2548661 cve-icon cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2016:1940 cve-icon
https://access.redhat.com/errata/RHSA-2017:1216 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2708 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2709 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2710 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3113 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3114 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3239 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3240 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2123 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1245 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2859 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0451 cve-icon cve-icon
https://access.redhat.com/security/cve/cve-2016-2183 cve-icon cve-icon
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ cve-icon cve-icon
https://bto.bluecoat.com/security-advisory/sa133 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1369383 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf cve-icon cve-icon
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849 cve-icon cve-icon
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 cve-icon cve-icon
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10171 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10186 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10197 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10215 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10310 cve-icon cve-icon
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ cve-icon cve-icon
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2016-2183 cve-icon
https://seclists.org/bugtraq/2018/Nov/21 cve-icon cve-icon
https://security.gentoo.org/glsa/201612-16 cve-icon cve-icon
https://security.gentoo.org/glsa/201701-65 cve-icon cve-icon
https://security.gentoo.org/glsa/201707-01 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20160915-0001/ cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20170119-0001/ cve-icon cve-icon
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 cve-icon cve-icon
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 cve-icon cve-icon
https://support.f5.com/csp/article/K13167034 cve-icon cve-icon
https://sweet32.info/ cve-icon cve-icon cve-icon
https://wiki.opendaylight.org/view/Security_Advisories cve-icon cve-icon
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2016-2183 cve-icon
https://www.exploit-db.com/exploits/42091/ cve-icon cve-icon
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html cve-icon cve-icon
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 cve-icon cve-icon
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ cve-icon cve-icon
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html cve-icon cve-icon
https://www.sigsac.org/ccs/CCS2016/accepted-papers/ cve-icon cve-icon
https://www.tenable.com/security/tns-2016-16 cve-icon cve-icon
https://www.tenable.com/security/tns-2016-20 cve-icon cve-icon
https://www.tenable.com/security/tns-2016-21 cve-icon cve-icon
https://www.tenable.com/security/tns-2017-09 cve-icon cve-icon
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue cve-icon cve-icon
https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability cve-icon
https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability cve-icon

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-03-31T14:15:56.806Z

Reserved: 2016-01-29T00:00:00.000Z

Link: CVE-2016-2183

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-09-01T00:59:00.137

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-2183

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-08-24T00:00:00Z

Links: CVE-2016-2183 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses