A protocol flaw was found in the DES/3DES cipher, used as a part of the SSL/TLS protocol. A man-in-the-middle attacker could use this flaw to recover some plain text data by capturing large amounts of encrypted traffic between the SSL/TLS server and the client if the communication uses a DES/3DES based cipher suite. The Sweet32 Attack is documented as requiring at least 32GB ...
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.