An attacker using a carefully crafted handshake can force the use of weak
keying material in OpenSSL SSL/TLS clients and servers. This can be exploited
-by a MITM attack where the attacker can decrypt and modify traffic from
-the attacked client and server.
+by a Man-in-the-middle (MITM) attack where the attacker can decrypt and
+modify traffic from the attacked client and server.
The attack can only be performed between a vulnerable client *and*
server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers