Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 941

ROBOT Attack

What is ROBOT Attack?

ROBOT AttackA 2017 resurrection of Bleichenbacher's 1998 RSA PKCS#1 v1.5 padding oracle on TLS servers, enabling session decryption or impersonation.


ROBOT (Return Of Bleichenbacher's Oracle Threat) was published in 2017 by Boeck, Somorovsky and Young. It showed that many TLS stacks still leaked enough information during RSA key-exchange to mount Bleichenbacher's adaptive chosen-ciphertext attack on PKCS#1 v1.5 padding. Vulnerable products from F5, Citrix, Cisco, Erlang, Bouncy Castle and others received separate CVEs. With a few thousand to a few million queries an attacker can recover the premaster secret of a captured session and decrypt it, or sign data with the server's private key. Mitigations: disable static-RSA key-exchange ciphersuites, prefer (EC)DHE, and adopt TLS 1.3 which removes PKCS#1 v1.5 RSA encryption entirely.

Examples

  1. 01

    Decrypting recorded HTTPS sessions to Facebook's load balancers (CVE-2017-1428x family).

  2. 02

    Forging a TLS signature with the server's private key to impersonate it to a client.

Frequently asked questions

What is ROBOT Attack?

A 2017 resurrection of Bleichenbacher's 1998 RSA PKCS#1 v1.5 padding oracle on TLS servers, enabling session decryption or impersonation. It belongs to the Attacks & Threats category of cybersecurity.

What does ROBOT Attack mean?

A 2017 resurrection of Bleichenbacher's 1998 RSA PKCS#1 v1.5 padding oracle on TLS servers, enabling session decryption or impersonation.

How does ROBOT Attack work?

ROBOT (Return Of Bleichenbacher's Oracle Threat) was published in 2017 by Boeck, Somorovsky and Young. It showed that many TLS stacks still leaked enough information during RSA key-exchange to mount Bleichenbacher's adaptive chosen-ciphertext attack on PKCS#1 v1.5 padding. Vulnerable products from F5, Citrix, Cisco, Erlang, Bouncy Castle and others received separate CVEs. With a few thousand to a few million queries an attacker can recover the premaster secret of a captured session and decrypt it, or sign data with the server's private key. Mitigations: disable static-RSA key-exchange ciphersuites, prefer (EC)DHE, and adopt TLS 1.3 which removes PKCS#1 v1.5 RSA encryption entirely.

How do you defend against ROBOT Attack?

Defences for ROBOT Attack typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for ROBOT Attack?

Common alternative names include: ROBOT, Return Of Bleichenbacher's Oracle Threat.

Related terms

See also