CVE-2015-6357
18.11.2015, 11:59
The rule-update feature in Cisco FireSIGHT Management Center (MC) 5.2 through 5.4.0.1 does not verify the X.509 certificate of the support.sourcefire.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide an invalid package, and consequently execute arbitrary code, via a crafted certificate, aka Bug ID CSCuw06444.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | firesight_system_software | 5.2.0 |
cisco | firesight_system_software | 5.3.0 |
cisco | firesight_system_software | 5.3.1.1 |
cisco | firesight_system_software | 5.3.1.2 |
cisco | firesight_system_software | 5.3.1.5 |
cisco | firesight_system_software | 5.4.0 |
cisco | firesight_system_software | 5.4.0.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References