HomeOpensslCVE-2014-0160

CVE-2014-0160

HIGH
7.5CVSS
Published: 2014-04-07
Updated: 2025-10-22
AI Analysis

Description

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
none
Availability
none
Weaknesses
CWE-125CWE-125

Metadata

Primary Vendor
OPENSSL
Published
4/7/2014
Last Modified
10/22/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

openssl : opensslfilezilla-project : filezilla_serversiemens : application_processing_engine_firmwaresiemens : cp_1543-1_firmwaresiemens : simatic_s7-1500_firmwaresiemens : simatic_s7-1500t_firmwaresiemens : elan-8.2siemens : wincc_open_architectureintellian : v100_firmwareintellian : v100_firmwareintellian : v100_firmwareintellian : v60_firmwareintellian : v60_firmwaremitel : micollabmitel : micollabmitel : micollabmitel : micollabmitel : micollabmitel : micollabmitel : mivoicemitel : mivoicemitel : mivoicemitel : mivoicemitel : mivoiceopensuse : opensuseopensuse : opensusecanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxfedoraproject : fedorafedoraproject : fedoraredhat : gluster_storageredhat : storageredhat : virtualizationredhat : enterprise_linux_desktopredhat : enterprise_linux_serverredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_eusredhat : enterprise_linux_server_tusredhat : enterprise_linux_workstationdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxricon : s9922l_firmwarebroadcom : symantec_messaging_gatewaybroadcom : symantec_messaging_gatewaysplunk : splunk

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief