8.1

CVE-2015-8960

Media report
Exploit

The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.

Data is provided by the National Vulnerability Database (NVD)
IetfTransport Layer Security Version <= 1.2
   AppleSafari Version-
   GoogleChrome Version-
   MicrosoftInternet Explorer Version-
   MozillaFirefox Version-
   OperaOpera Browser Version-
NetappData Ontap Edge Version-
NetappHost Agent Version-
NetappOncommand Shift Version-
NetappSmi-s Provider Version-
NetappSnapdrive Version- SwPlatformunix
NetappSnapdrive Version- SwPlatformwindows
NetappSnapmanager Version- SwPlatformoracle
NetappSnapmanager Version- SwPlatformsap
NetappSnapprotect Version-
NetappSystem Setup Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.36% 0.555
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.1 2.2 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-295 Improper Certificate Validation

The product does not validate, or incorrectly validates, a certificate.