Vulnerability Description
The firmware in MNS before 4.5.6 on Belden GarrettCom Magnum 6K and Magnum 10K switches uses hardcoded RSA private keys and certificates across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms for HTTPS sessions by leveraging knowledge of a private key from another installation.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Garrettcom | Magnum 10K Firmware | <= 4.5.5 |
| Garrettcom | Magnum 6K Firmware | <= 4.5.5 |
Related Weaknesses (CWE)
References
- http://www.garrettcom.com/techsupport/MNS6K_R456_Release_Notes.pdfVendor Advisory
- http://www.securityfocus.com/bid/75236
- https://ics-cert.us-cert.gov/advisories/ICSA-15-167-01Third Party AdvisoryUS Government Resource
- http://www.garrettcom.com/techsupport/MNS6K_R456_Release_Notes.pdfVendor Advisory
- http://www.securityfocus.com/bid/75236
- https://ics-cert.us-cert.gov/advisories/ICSA-15-167-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2015-3960?
CVE-2015-3960 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The firmware in MNS before 4.5.6 on Belden GarrettCom Magnum 6K and Magnum 10K switches uses hardcoded RSA private keys and certificates across different customers' installations, which makes it easie...
How severe is CVE-2015-3960?
CVE-2015-3960 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3960?
Check the references section above for vendor advisories and patch information. Affected products include: Garrettcom Magnum 10K Firmware, Garrettcom Magnum 6K Firmware.