HIGH · 8.1

CVE-2015-8960

The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute th...

Vulnerability Description

The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.

CVSS Score

8.1

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
IetfTransport Layer Security<= 1.2
AppleSafari-
GoogleChrome-
MicrosoftInternet Explorer-
MozillaFirefox-
OperaOpera Browser-
NetappClustered Data Ontap Antivirus Connector-
NetappData Ontap Edge-
NetappHost Agent-
NetappOncommand Shift-
NetappPlug-In For Symantec Netbackup-
NetappSmi-S Provider-
NetappSnap Creator Framework-
NetappSnapdrive-
NetappSnapmanager-
NetappSnapprotect-
NetappSolidfire \& Hci Management Node-
NetappSystem Setup-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-8960?

CVE-2015-8960 is a vulnerability with a CVSS score of 8.1 (HIGH). The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute th...

How severe is CVE-2015-8960?

CVE-2015-8960 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-8960?

Check the references section above for vendor advisories and patch information. Affected products include: Ietf Transport Layer Security, Apple Safari, Google Chrome, Microsoft Internet Explorer, Mozilla Firefox.