LIVE NEWSROOM · --:-- · May 25, 2026
A LIBRARY FOR SECURITY RESEARCHERS

CVE DATABASE  /  CVE-2002-20001

CVE-2002-20001

CVSS 7.5 · HIGH

Summary

The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.

CVSS 3.1 breakdown

Base score7.5 (HIGH)
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack vectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityNONE
IntegrityNONE
AvailabilityHIGH

Weakness type (CWE)

Affected products

Balasys dheaterSiemens scalance w1750d firmwareSiemens scalance w1750dSuse linux enterprise serverF5 big-ip access policy managerF5 big-ip advanced firewall managerF5 big-ip advanced web application firewallF5 big-ip analyticsF5 big-ip application acceleration managerF5 big-ip application security managerF5 big-ip application visibility and reportingF5 big-ip carrier-grade natF5 big-ip ddos hybrid defenderF5 big-ip domain name systemF5 big-ip edge gatewayF5 big-ip fraud protection serviceF5 big-ip global traffic managerF5 big-ip link controllerF5 big-ip local traffic managerF5 big-ip policy enforcement manager
Check this CVE live

Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.

References

Data: NIST NVD. NVD last modified 2025-08-22. Always verify against the vendor advisory before acting.

Scroll to Top