CVE-2020-13777
📋 TL;DR
This GnuTLS vulnerability uses incorrect cryptography for session ticket encryption, causing loss of confidentiality in TLS 1.2 and authentication bypass in TLS 1.3. It affects GnuTLS 3.6.4 through 3.6.13 on any system using these versions for TLS connections.
💻 Affected Systems
- GnuTLS
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
⚠️ Risk & Real-World Impact
Worst Case
Attackers could decrypt TLS 1.2 session data or bypass authentication in TLS 1.3, potentially exposing sensitive data or gaining unauthorized access to protected resources.
Likely Case
Session data exposure in TLS 1.2 connections, allowing attackers to intercept and decrypt communications between clients and servers.
If Mitigated
Limited impact if proper network segmentation and monitoring are in place, though encryption failures still occur.
🎯 Exploit Status
Exploitation requires network access to intercept TLS sessions. No public exploit code was found in references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.6.14
Vendor Advisory: https://gnutls.org/security-new.html#GNUTLS-SA-2020-06-03
Restart Required: Yes
Instructions:
1. Update GnuTLS to version 3.6.14 or later using your distribution's package manager. 2. Restart all services using GnuTLS. 3. Consider rotating TLS session keys if previously using affected versions.
🔧 Temporary Workarounds
Disable session tickets
linuxDisable TLS session ticket support to avoid the vulnerable encryption mechanism
For GnuTLS applications: Set GNUTLS_NO_TICKETS=1 environment variable
For server configurations: Add 'ticket = off' to TLS settings
🧯 If You Can't Patch
- Implement network segmentation to isolate systems using vulnerable GnuTLS versions
- Use alternative TLS libraries or implementations for critical services
🔍 How to Verify
Check if Vulnerable:
Check GnuTLS version with: gnutls-cli --version | head -1
Check Version:
gnutls-cli --version | head -1
Verify Fix Applied:
Verify version is 3.6.14 or higher: gnutls-cli --version | grep -q '3\.6\.1[4-9]\|3\.6\.[2-9]\|3\.[7-9]'
📡 Detection & Monitoring
Log Indicators:
- Unusual TLS handshake failures
- Session resumption anomalies
Network Indicators:
- TLS session ticket interception attempts
- Unusual traffic patterns to TLS services
SIEM Query:
source="*tls*" AND (event="handshake_failure" OR event="session_resume")
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00015.html
- https://gnutls.org/security-new.html#GNUTLS-SA-2020-06-03
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6C4DHUKV6M6SJ5CV6KVHZNHNF7HCUE5P/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RTXZOXC4MHTFE2HKY6IAZMF2WHD2WMV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRQBFK3UZ7SV76IYDTS4PS6ABS2DSJHK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMB3UGI5H5RCFRU6OGRPMNUCNLJGEN7Y/
- https://security.gentoo.org/glsa/202006-01
- https://security.netapp.com/advisory/ntap-20200619-0004/
- https://usn.ubuntu.com/4384-1/
- https://www.debian.org/security/2020/dsa-4697
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00015.html
- https://gnutls.org/security-new.html#GNUTLS-SA-2020-06-03
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6C4DHUKV6M6SJ5CV6KVHZNHNF7HCUE5P/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RTXZOXC4MHTFE2HKY6IAZMF2WHD2WMV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRQBFK3UZ7SV76IYDTS4PS6ABS2DSJHK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMB3UGI5H5RCFRU6OGRPMNUCNLJGEN7Y/
- https://security.gentoo.org/glsa/202006-01
- https://security.netapp.com/advisory/ntap-20200619-0004/
- https://usn.ubuntu.com/4384-1/
- https://www.debian.org/security/2020/dsa-4697