mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
181 lines
6.7 KiB
JSON
181 lines
6.7 KiB
JSON
{
|
|
"id": "CVE-2015-6427",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2015-12-18T11:59:02.793",
|
|
"lastModified": "2016-12-07T18:20:19.883",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco FireSIGHT Management Center allows remote attackers to bypass the HTTP attack detection feature and avoid triggering Snort IDS rules via an SSL session that is mishandled after decryption, aka Bug ID CSCux53437."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cisco FireSIGHT Management Center permite a atacantes remotos eludir la funcionalidad de detecci\u00f3n de ataques HTTP y evitar desencadenar las reglas del IDS Snort a trav\u00e9s de una sesi\u00f3n SSL que no es manejada adecuadamente despu\u00e9s del desencritado, tambi\u00e9n conocido como Bug ID CSCux53437."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-254"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F1049BCE-4A7B-4636-9090-17724D5AFBA4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.3.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87359216-7FDC-4235-9DEC-6BAF04214FC4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.3.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C5912CE-A631-4A16-84EE-E7B9864655D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1BEF2B98-243F-4796-A98C-A978C4CCAD91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.3.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59A9002E-66A1-4C35-8D07-9BC438350081"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.3.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34C49E27-A356-45E5-9FF3-242C37626718"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.3.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1B9FBE0-7771-49C9-96D9-204B684AB693"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.3.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "380900BB-4F03-4E76-A78C-DFB43669494F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.3.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A5273EE5-40CA-48B5-8F60-823CDB75F3A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.3.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A476BF5E-1877-4B47-8E89-240910B49A16"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0EB13B96-D431-49BD-ADAB-9AE5DB559935"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79AECC9E-657F-4BFF-B640-B96CD1384647"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.4.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9CB0484C-F0B7-4349-856E-194E97A7F8A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7DC251B-1CA8-4232-A900-885933E01FB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.4.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD0DF530-4865-45A1-87CA-6ED6026A56A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.4.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7335266F-B16F-4EFB-B1D2-1F61B3EBB437"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:5.4.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13BF9C6F-B511-444B-B6B7-960DF8758964"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:6.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55D52DB0-4441-41C9-900E-DE917B0CBC91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:6.0.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D032900-6B00-4F4D-A2F7-6119F113675F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:firesight_system_software:6.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC5565FE-174C-41C7-9462-9138BB31507D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151217-fsm",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1034488",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |