Vulnerability Description
The rule-update feature in Cisco FireSIGHT Management Center (MC) 5.2 through 5.4.0.1 does not verify the X.509 certificate of the support.sourcefire.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide an invalid package, and consequently execute arbitrary code, via a crafted certificate, aka Bug ID CSCuw06444.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Firesight System Software | 5.2.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/134390/Cisco-FireSIGHT-Management-Center-Ce
- http://seclists.org/fulldisclosure/2015/Nov/79
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Vendor Advisory
- http://wadofstuff.blogspot.com.au/2015/11/cve-2015-6357-firepwner-exploit-for.ht
- http://www.securityfocus.com/archive/1/536913/100/0/threaded
- http://www.securitytracker.com/id/1034161
- http://packetstormsecurity.com/files/134390/Cisco-FireSIGHT-Management-Center-Ce
- http://seclists.org/fulldisclosure/2015/Nov/79
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Vendor Advisory
- http://wadofstuff.blogspot.com.au/2015/11/cve-2015-6357-firepwner-exploit-for.ht
- http://www.securityfocus.com/archive/1/536913/100/0/threaded
- http://www.securitytracker.com/id/1034161
FAQ
What is CVE-2015-6357?
CVE-2015-6357 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The rule-update feature in Cisco FireSIGHT Management Center (MC) 5.2 through 5.4.0.1 does not verify the X.509 certificate of the support.sourcefire.com SSL server, which allows man-in-the-middle att...
How severe is CVE-2015-6357?
CVE-2015-6357 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-6357?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Firesight System Software.