Hi,
If I understand your question correctly, you mean the following attack:
- Client sends CH
- Attacker changes CH to only list a very insecure cipher suite
- Server supports this cipher suite and sends SH with insecure CS as the chosen CS.
- Handshake continues
- Client sends FIN, which is intercepted by attacker
- Attacker somehow bruteforces a correct master secret (using the original MAC?), sends forged MAC to the server
- Success
This attack assumes that the attacker can somehow try each bruteforce step without the server closing the connection.
It would only work if both client AND server support this very insecure CS.
The client also needs to initially offer this CS, otherwise, it would not continue with the handshake.
In practice, this is very unlikely.
Does this clear it up?
Cheers,
Sebastian