First published: Wed Jul 29 2015(Updated: )
The LDAP implementation on the Cisco Web Security Appliance (WSA) 8.5.0-000, Email Security Appliance (ESA) 8.5.7-042, and Content Security Management Appliance (SMA) 8.3.6-048 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate, aka Bug IDs CSCuo29561, CSCuv40466, and CSCuv40470.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Web Security Appliance | =8.5.0-000 | |
Cisco Email Security Appliance Firmware | =8.5.7-042 | |
Cisco Content Security Management Virtual Appliance | =8.3.6-048 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4288 has a medium severity rating due to its potential to allow man-in-the-middle attacks.
To fix CVE-2015-4288, it is recommended to upgrade the affected Cisco appliances to the latest firmware version.
CVE-2015-4288 affects the Cisco Web Security Appliance, Email Security Appliance, and Content Security Management Appliance on specific versions.
CVE-2015-4288 allows attackers to perform man-in-the-middle attacks by spoofing SSL servers.
Yes, CVE-2015-4288 impacts the validation of X.509 certificates from SSL servers.