Security Advisory

Published: July 29, 2018
Last Update: July 29, 2018

In December 2017, CERT Coordination Center (CERT/CC) released Vulnerability Note VU#144389 [1] to report potential new TLS exposures for a variety of vendors to a variant of Hanno Böck’s Bleichenbacher Oracle vulnerability. This vulnerability is referred to as ROBOT (Return Of Bleichenbacher's Oracle Threat) [2].

A10 Networks products and ACOS are not affected by the TLS ROBOT vulnerability. However, some vulnerability scanning and detection tools, including the Proof-of-Concept (PoC) robot-detect script [3], may generate false positive reports for TLS ROBOT when tested against certain ACOS systems.

This false-positive is due to a behavior of ACOS for systems, with 3rd-generation SSL/TLS hardware solutions, being misinterpreted by these tools as a valid detection of the vulnerability. A10 Networks addresses such false reports as described in this document.

Item # Vulnerability ID Score Source Score Summary
1 A10-2017-0009 CVSS 3.0 0.0 Low TLS: ROBOT False Positive Reports
Affected Releases

The table below indicates releases of ACOS potentially affected by these false-positives and ACOS releases that address them. ACOS release families not indicated below are not prone to such reports.

Customers using affected ACOS releases can overcome such false reports by updating to the indicated resolved release. If the table does not list a corresponding resolved or unaffected release, then no ACOS release update is currently available.

Releases Affected Releases Resolved or Unaffected
4.1.4 – 4.1.4-P1 4.1.4-P2
4.1.2 – 4.1.2-P4 4.1.2-P5
4.1.1 – 4.1.1-P8 4.1.1-P9
Workarounds and Mitigations


Software Updates

Software updates that address these vulnerabilities are or will be published at the following URL:

Vulnerability Details

The following table shares brief descriptions of the vulnerabilities addressed in this document.

Vulnerability ID Vulnerability Description

TLS implementations may disclose side channel information via discrepancies between valid and invalid PKCS#1 padding and may therefore be vulnerable to Bleichenbacher-style attacks. This attack is known as a "ROBOT attack".

A remote, unauthenticated attacker may be able to obtain the TLS pre-master secret (TLS session key) and decrypt TLS traffic.

Disable TLS RSA - affected users and system administrators are encouraged to disable TLS RSA cyphers if possible. Please refer to your product's documentation or contact the vendor's customer service.

Apply an update - Some products may have software updates available to address this issue. If an update is available, affected users are encouraged to update product software or firmware. Please see the Affected Vendors list below for more information.

Related Links

The following table shares brief descriptions for the vulnerabilities addressed in this document.

Ref # General Link
[1] CERT Coordination Center (CERT/CC), Vulnerability Note VU#144389
[2] https://robotattack.org/
[3] https://github.com/robotattackorg/robot-detect


Modification History
Revision Date Description
1.0 July 29, 2018

Initial Publication

© Copyright 2018 A10 Networks, Inc. All Rights Reserved.

This document is provided on an "AS IS" basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability, non-infringement or fitness for a particular use. Your use of the information in this document or materials linked from this document is at your own risk. A10 Networks, Inc. reserves the right to change or update the information in this document at any time.