First published: Wed Nov 18 2015(Updated: )
The rule-update feature in Cisco FireSIGHT Management Center (MC) 5.2 through 5.4.0.1 does not verify the X.509 certificate of the support.sourcefire.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide an invalid package, and consequently execute arbitrary code, via a crafted certificate, aka Bug ID CSCuw06444.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FireSIGHT System Software | =5.2.0 | |
Cisco FireSIGHT System Software | =5.3.0 | |
Cisco FireSIGHT System Software | =5.3.1.1 | |
Cisco FireSIGHT System Software | =5.3.1.2 | |
Cisco FireSIGHT System Software | =5.3.1.5 | |
Cisco FireSIGHT System Software | =5.4.0 | |
Cisco FireSIGHT System Software | =5.4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.