The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.
2016-09-21T02:59:00.133
2025-04-12T10:46:40.837
Deferred
CVSSv3.1: 8.1 (HIGH)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ietf | transport_layer_security | ≤ 1.2 | Yes |
Application | apple | safari | - | No |
Application | chrome | - | No | |
Application | microsoft | internet_explorer | - | No |
Application | mozilla | firefox | - | No |
Application | opera | opera_browser | - | No |
Application | netapp | clustered_data_ontap_antivirus_connector | - | Yes |
Application | netapp | data_ontap_edge | - | Yes |
Application | netapp | host_agent | - | Yes |
Application | netapp | oncommand_shift | - | Yes |
Application | netapp | plug-in_for_symantec_netbackup | - | Yes |
Application | netapp | smi-s_provider | - | Yes |
Application | netapp | snap_creator_framework | - | Yes |
Application | netapp | snapdrive | - | Yes |
Application | netapp | snapdrive | - | Yes |
Application | netapp | snapmanager | - | Yes |
Application | netapp | snapmanager | - | Yes |
Application | netapp | snapprotect | - | Yes |
Application | netapp | solidfire_\&_hci_management_node | - | Yes |
Application | netapp | system_setup | - | Yes |