mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
181 lines
6.3 KiB
JSON
181 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2015-2323",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2015-08-11T14:59:01.807",
|
|
"lastModified": "2024-11-21T02:27:12.870",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "FortiOS 5.0.x before 5.0.12 and 5.2.x before 5.2.4 supports anonymous, export, RC4, and possibly other weak ciphers when using TLS to connect to FortiGuard servers, which allows man-in-the-middle attackers to spoof TLS content by modifying packets."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad en FortiOS 5.0.x en versiones anteriores a 5.0.12 y 5.2.x en versiones anteriores a 5.2.4 admite el anonimato, exportaci\u00f3n, RC4 y posiblemente otros cifrados d\u00e9biles al utilizar TLS para conectarse a los servidores de FortiGuard, lo que permite a atacantes man-in-the-middle suplantar contenido TLS mediante la modificaci\u00f3n de los paquetes."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
|
"baseScore": 6.4,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-310"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E542BE2-14FC-4BA8-890C-7DA81F33F032"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D8A5EC4-CE2C-4174-9F09-361B8D153AD9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3BABC91-F9BF-4B52-BDBF-F9617ABCAC9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C172379-F6BA-4343-831A-62004E742C6D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "516597D9-086E-4668-A40B-473F38125F92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D62F480B-D8CA-4F5C-8034-C0AE73F26B67"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F435F408-EC5B-42A0-9E3C-4DE5D702ACAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "823C8357-E638-4EAE-B231-3B60263FFE52"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C6615C7-C6F8-4E42-BA09-5A29A0B68E09"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B24C5917-BBC0-4924-9FB0-49E141DC9D54"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "513A1CAA-9B87-4CF5-9513-396E2E686CDF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "62CD94B3-C430-4672-BBEA-B8A542944F66"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E627C59-7C16-44F0-800D-A2E8A766B26D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "233236FA-BB13-4261-BE2E-3E617406DC53"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "27844CC9-498B-4A65-91AC-AC130222EE5F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fortinet:fortios:5.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "27B4C672-7ED5-4113-87AE-5774D1263C0B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://fortiguard.com/advisory/2015-07-24-weak-ciphers-suites-are-presented-towards-fortiguard-servers",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.fortiguard.com/advisory/FG-IR-15-021/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1033092",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://fortiguard.com/advisory/2015-07-24-weak-ciphers-suites-are-presented-towards-fortiguard-servers",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.fortiguard.com/advisory/FG-IR-15-021/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1033092",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |