Critical OpenSSL vulnerabilities - DROWN CVE-2016-0800


DROWN is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS. This vulnerability allows attackers to break the encryption and read or steal sensitive communications.

Who is vulnerable ?:

A server is vulnerable to DROWN if:

  • It allows SSLv2 connections.
  • Its private key is used on any other server that allows SSLv2 connections, even for another protocol.

Other less critical OpenSSL vulnerabilities have been discovered and are explained here:

Specific to Operating System:

Please make sure to verify if a patched version of OpenSSL has been released for your Operating System version before updating it:

Red Hat and CentOS


While Ubuntu is not afftected by CVE-2016-0800, it is affected by CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0798, CVE-2016-0799 and the OpenSSL package should be updated:

Windows server Microsoft IIS
IIS versions 7.0 and above should have SSLv2 disabled by default. IIS versions below 7.0 are no longer supported by Microsoft and should be upgraded to supported versions.


On CentOS and Red Hat Enterprise Linux 


yum clean all

yum update openssl


On Ubuntu and Debian


sudo apt-get update

sudo apt-get install openssl


We suggest that you subscribe to your OS notification system at the following URLs:

Red Hat - RHSA-announce (
CentOS - CentOS-announce (
Ubuntu - ubuntu-security-announce (
Debian - debian-security-announce (


Have more questions? Submit a request


Article is closed for comments.
Powered by Zendesk