Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-12872

CVE-2020-12872: Yaws Weak TLS Cipher Vulnerability

CVE-2020-12872 is a weak TLS cipher vulnerability in Yaws web server that loads obsolete ciphers allowing Sweet32 attacks on Erlang/OTP versions below 21.0. This article covers technical details, affected versions, and mitigation.

Published: March 4, 2026

CVE-2020-12872 Overview

CVE-2020-12872 is a cryptographic vulnerability affecting Yaws, a high-performance HTTP web server written in Erlang. The vulnerability exists in yaws_config.erl, which loads obsolete TLS ciphers when running on Erlang/OTP virtual machines with versions prior to 21.0. These deprecated ciphers are susceptible to the Sweet32 birthday attack, potentially allowing attackers to decrypt sensitive session data through prolonged traffic analysis.

Critical Impact

Systems running Yaws through version 2.0.2 or 2.0.7 on older Erlang/OTP runtimes (below 21.0) may expose encrypted communications to cryptographic attacks, allowing potential recovery of plaintext data from TLS-protected sessions.

Affected Products

  • Yaws web server through version 2.0.2
  • Yaws web server through version 2.0.7
  • Systems running on Erlang/OTP virtual machines with versions less than 21.0

Discovery Timeline

  • 2020-05-15 - CVE-2020-12872 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2020-12872

Vulnerability Analysis

The vulnerability stems from improper cryptographic cipher selection in the Yaws configuration module. When Yaws runs on Erlang/OTP versions prior to 21.0, the yaws_config.erl file loads a default set of TLS ciphers that includes obsolete 64-bit block ciphers such as 3DES (Triple DES). These ciphers are vulnerable to the Sweet32 attack, a birthday attack that exploits the limited block size to recover plaintext from encrypted communications.

The Sweet32 attack becomes practical when an attacker can capture approximately 32GB of encrypted traffic using the same session key. While this requires significant traffic capture, long-lived HTTPS connections and persistent TLS sessions make this attack feasible in real-world scenarios, particularly for high-traffic web applications.

Root Cause

The root cause lies in CWE-326: Inadequate Encryption Strength. The yaws_config.erl module does not properly filter out weak cipher suites when initializing TLS configurations on older Erlang/OTP runtimes. The vulnerable code section, located around lines 2068-2075 in the configuration file, includes deprecated ciphers in the default cipher list without considering the security implications of 64-bit block ciphers.

Erlang/OTP versions 21.0 and later addressed this by updating their default cipher suites, but Yaws versions through 2.0.2/2.0.7 do not account for this discrepancy when running on older runtime versions.

Attack Vector

The attack requires local access to capture encrypted network traffic. An attacker with the ability to intercept TLS-encrypted communications between clients and a vulnerable Yaws server can accumulate sufficient ciphertext to mount a Sweet32 attack. The attack proceeds as follows:

  1. The attacker identifies a Yaws server using obsolete TLS ciphers
  2. Traffic is captured over an extended period or during high-volume sessions
  3. Once approximately 2^32 blocks of data are collected, collision analysis enables partial plaintext recovery
  4. Session tokens, authentication cookies, or other repeated data patterns become vulnerable to extraction

For detailed technical analysis of this vulnerability, refer to the Medium CVE-2020-12872 Analysis and the Sweet32 Information Resource.

Detection Methods for CVE-2020-12872

Indicators of Compromise

  • TLS connections negotiating 3DES or other 64-bit block cipher suites
  • Yaws server logs showing cipher suite selections containing DES-CBC3 or similar deprecated algorithms
  • Erlang/OTP runtime version below 21.0 detected in server environment
  • Unusual volume of traffic capture attempts targeting HTTPS services

Detection Strategies

  • Audit TLS cipher configurations using tools like nmap --script ssl-enum-ciphers to identify servers offering weak ciphers
  • Monitor Yaws configuration files for the presence of deprecated cipher definitions in yaws_config.erl
  • Implement network monitoring to detect long-duration TLS sessions that could facilitate Sweet32 attacks
  • Review Erlang/OTP version deployed alongside Yaws installations

Monitoring Recommendations

  • Configure security information and event management (SIEM) alerts for TLS handshakes using deprecated cipher suites
  • Establish baseline metrics for TLS session duration and flag anomalously long connections
  • Deploy vulnerability scanners to periodically assess web server cipher suite configurations
  • Monitor for unauthorized network packet capture activity targeting HTTPS traffic

How to Mitigate CVE-2020-12872

Immediate Actions Required

  • Upgrade Erlang/OTP runtime to version 21.0 or later to benefit from improved default cipher suites
  • Update Yaws to the latest available version that addresses cipher configuration issues
  • Manually configure TLS settings to explicitly exclude 64-bit block ciphers from allowed cipher suites
  • Audit all production Yaws deployments to identify vulnerable configurations

Patch Information

The vulnerability can be addressed by updating to newer versions of both Yaws and the Erlang/OTP runtime. Review the GitHub Yaws Release Notes for the latest security updates. The specific code changes related to this issue can be examined in the GitHub Yaws Code Snippet and tracked via the GitHub Yaws Issue Tracker.

Workarounds

  • Explicitly configure Yaws to use only strong cipher suites with 128-bit or larger block sizes
  • Implement TLS 1.2 or TLS 1.3 with modern AEAD ciphers such as AES-GCM or ChaCha20-Poly1305
  • Deploy a reverse proxy with properly configured TLS termination in front of vulnerable Yaws instances
  • Limit TLS session duration to reduce the window for Sweet32 attack feasibility
bash
# Example: Check Erlang/OTP version and update if necessary
erl -eval 'erlang:display(erlang:system_info(otp_release)), halt().'
# If version is below 21, upgrade Erlang/OTP to version 21.0 or later
# Consult your package manager or Erlang documentation for upgrade procedures

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechYaws

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-326
  • Technical References
  • GitHub Yaws Code Snippet

  • GitHub Yaws Issue Tracker

  • GitHub Yaws Release Notes

  • Medium CVE-2020-12872 Analysis

  • Sweet32 Information Resource
  • Latest CVEs
  • CVE-2025-11419: Keycloak TLS DoS Vulnerability

  • CVE-2025-13947: WebKitGTK Information Disclosure Flaw

  • CVE-2026-40322: SiYuan Knowledge Management RCE Vulnerability

  • CVE-2026-40318: SiYuan Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English