6.8
CVE-2015-6357
- EPSS 5.94%
- Published 18.11.2015 11:59:01
- Last modified 12.04.2025 10:46:40
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
The rule-update feature in Cisco FireSIGHT Management Center (MC) 5.2 through 5.4.0.1 does not verify the X.509 certificate of the support.sourcefire.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide an invalid package, and consequently execute arbitrary code, via a crafted certificate, aka Bug ID CSCuw06444.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Firesight System Software Version5.2.0
Cisco ≫ Firesight System Software Version5.3.0
Cisco ≫ Firesight System Software Version5.3.1.1
Cisco ≫ Firesight System Software Version5.3.1.2
Cisco ≫ Firesight System Software Version5.3.1.5
Cisco ≫ Firesight System Software Version5.4.0
Cisco ≫ Firesight System Software Version5.4.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 5.94% | 0.903 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.