Vulnerability Description
Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Rv320 Firmware | <= 1.3.1.10 |
| Cisco | Rv320 | - |
| Cisco | Rv325 Firmware | <= 1.3.1.10 |
| Cisco | Rv325 | - |
| Cisco | Rvs4000 Firmware | <= 2.0.3.4 |
| Cisco | Rvs4000 | - |
| Cisco | Wrv210 Firmware | <= 2.0.1.5 |
| Cisco | Wrv210 | - |
| Cisco | Wap4410N Firmware | <= 2.0.7.8 |
| Cisco | Wap4410N | - |
| Cisco | Wrv200 Firmware | 1.0.39 |
| Cisco | Wrv200 | - |
| Cisco | Wrvs4400N Firmware | <= 2.0.2.2 |
| Cisco | Wrvs4400N | - |
| Cisco | Wap200 Firmware | <= 2.0.6.0 |
| Cisco | Wap200 | - |
| Cisco | Wvc2300 Firmware | <= 1.1.2.6 |
| Cisco | Wvc2300 | - |
| Cisco | Pvc2300 Firmware | <= 1.1.2.6 |
| Cisco | Pvc2300 | - |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Issue TrackingPatchVendor Advisory
- http://www.kb.cert.org/vuls/id/566724Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/78047Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034255Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034256Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034257Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034258Third Party AdvisoryVDB Entry
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Issue TrackingPatchVendor Advisory
- http://www.kb.cert.org/vuls/id/566724Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/78047Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034255Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034256Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034257Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034258Third Party AdvisoryVDB Entry
FAQ
What is CVE-2015-6358?
CVE-2015-6358 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man...
How severe is CVE-2015-6358?
CVE-2015-6358 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-6358?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Rv320 Firmware, Cisco Rv320, Cisco Rv325 Firmware, Cisco Rv325, Cisco Rvs4000 Firmware.