First published: Wed Nov 18 2015(Updated: )
The rule-update feature in Cisco FireSIGHT Management Center (MC) 5.2 through 5.4.0.1 does not verify the X.509 certificate of the support.sourcefire.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide an invalid package, and consequently execute arbitrary code, via a crafted certificate, aka Bug ID CSCuw06444.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FireSIGHT System Software | =5.2.0 | |
Cisco FireSIGHT System Software | =5.3.0 | |
Cisco FireSIGHT System Software | =5.3.1.1 | |
Cisco FireSIGHT System Software | =5.3.1.2 | |
Cisco FireSIGHT System Software | =5.3.1.5 | |
Cisco FireSIGHT System Software | =5.4.0 | |
Cisco FireSIGHT System Software | =5.4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6357 has a high severity rating due to its potential to allow arbitrary code execution via man-in-the-middle attacks.
To fix CVE-2015-6357, users should update their Cisco FireSIGHT Management Center to a patched version provided by Cisco.
CVE-2015-6357 affects Cisco FireSIGHT Management Center versions 5.2.0 through 5.4.0.1.
CVE-2015-6357 can facilitate man-in-the-middle attacks that allow an attacker to spoof a valid server.
The potential consequences of CVE-2015-6357 include execution of arbitrary code and manipulation of software updates.