The rule-update feature in Cisco FireSIGHT Management Center (MC) 5.2 through 5.4.0.1 does not verify the X.509 certificate of the support.sourcefire.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide an invalid package, and consequently execute arbitrary code, via a crafted certificate, aka Bug ID CSCuw06444.
2015-11-18T11:59:01.387
2025-04-12T10:46:40.837
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | firesight_system_software | 5.2.0 | Yes |
Application | cisco | firesight_system_software | 5.3.0 | Yes |
Application | cisco | firesight_system_software | 5.3.1.1 | Yes |
Application | cisco | firesight_system_software | 5.3.1.2 | Yes |
Application | cisco | firesight_system_software | 5.3.1.5 | Yes |
Application | cisco | firesight_system_software | 5.4.0 | Yes |
Application | cisco | firesight_system_software | 5.4.0.1 | Yes |