Medium severity5.9NVD Advisory· Published Jan 31, 2017· Updated May 13, 2026
CVE-2016-6329
CVE-2016-6329
Description
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- www-01.ibm.com/support/docview.wssnvdPermissions RequiredThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www.securityfocus.com/bid/92631nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1036695nvdThird Party AdvisoryVDB Entry
- community.openvpn.net/openvpn/wiki/SWEET32nvdVendor Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- security.gentoo.org/glsa/201611-02nvdThird Party Advisory
- sweet32.infonvdTechnical DescriptionThird Party Advisory
- cert-portal.siemens.com/productcert/pdf/ssa-556833.pdfnvd
News mentions
0No linked articles in our index yet.