DROWNlike
DROWNlike refers to a class of vulnerabilities that exploit weaknesses in TLS/SSL implementations, similar in principle to the DROWN (Decrypting RSA with Obsolete and Weakened Encryption) attack. These vulnerabilities typically arise when systems support older, less secure cryptographic protocols alongside newer, more robust ones, and can be exploited under specific circumstances.
The core of a DROWNlike attack often involves leveraging the fact that a server might be susceptible
While DROWN itself specifically targeted RSA private keys used with SSLv2, DROWNlike attacks can encompass similar