6.8
CVE-2015-1878
- EPSS 0.07%
- Veröffentlicht 18.08.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Thales nShield Connect hardware models 500, 1500, 6000, 500+, 1500+, and 6000+ before 11.72 allows physically proximate attackers to sign arbitrary data with previously loaded signing keys, extract the device identification key [KNETI] and impersonate the nShield Connect device on a network, affect the integrity and confidentiality of newly created keys, and potentially cause other unspecified impacts using previously loaded keys by connecting to the USB port on the front panel.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Thalesesecurity ≫ Nshield Connect Firmware Version <= 11.30
Thalesesecurity ≫ Nshield Connect 1500 Version-
Thalesesecurity ≫ Nshield Connect 500 Version-
Thalesesecurity ≫ Nshield Connect 6000 Version-
Thalesesecurity ≫ Nshield Connect 500 Version-
Thalesesecurity ≫ Nshield Connect 6000 Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.176 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 0.9 | 5.9 |
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 4.6 | 3.9 | 6.4 |
AV:L/AC:L/Au:N/C:P/I:P/A:P
|