Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2015-8960


The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.


Published

2016-09-21T02:59:00.133

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-295

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ietf transport_layer_security ≤ 1.2 Yes
Application apple safari - No
Application google chrome - No
Application microsoft internet_explorer - No
Application mozilla firefox - No
Application opera opera_browser - No
Application netapp clustered_data_ontap_antivirus_connector - Yes
Application netapp data_ontap_edge - Yes
Application netapp host_agent - Yes
Application netapp oncommand_shift - Yes
Application netapp plug-in_for_symantec_netbackup - Yes
Application netapp smi-s_provider - Yes
Application netapp snap_creator_framework - Yes
Application netapp snapdrive - Yes
Application netapp snapdrive - Yes
Application netapp snapmanager - Yes
Application netapp snapmanager - Yes
Application netapp snapprotect - Yes
Application netapp solidfire_\&_hci_management_node - Yes
Application netapp system_setup - Yes

References