A new timing vulnerability in Transport Layer Security (TLS) protocol could potentially allow an attacker to break the encryption and read sensitive communication under specific conditions. Dubbed ” Raccoon Attack,” the server-side attack exploits a side-channel in the cryptographic protocol (versions 1.2 and lower) to extract the shared secret key used for secure communications between two parties. F5, Microsoft, Mozilla, and OpenSSL have all released patches to thwart the attack by addressing the concern with ephemeral key reuse.
Source: https://thehackernews.com/2020/09/raccoon-ssl-tls-encryption.html

