First published: Fri Dec 18 2015(Updated: )
Cisco FireSIGHT Management Center allows remote attackers to bypass the HTTP attack detection feature and avoid triggering Snort IDS rules via an SSL session that is mishandled after decryption, aka Bug ID CSCux53437.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FireSIGHT System Software | =5.3.0 | |
Cisco FireSIGHT System Software | =5.3.0.1 | |
Cisco FireSIGHT System Software | =5.3.0.2 | |
Cisco FireSIGHT System Software | =5.3.1 | |
Cisco FireSIGHT System Software | =5.3.1.1 | |
Cisco FireSIGHT System Software | =5.3.1.2 | |
Cisco FireSIGHT System Software | =5.3.1.3 | |
Cisco FireSIGHT System Software | =5.3.1.4 | |
Cisco FireSIGHT System Software | =5.3.1.5 | |
Cisco FireSIGHT System Software | =5.3.1.7 | |
Cisco FireSIGHT System Software | =5.4.0 | |
Cisco FireSIGHT System Software | =5.4.0.1 | |
Cisco FireSIGHT System Software | =5.4.0.4 | |
Cisco FireSIGHT System Software | =5.4.1 | |
Cisco FireSIGHT System Software | =5.4.1.2 | |
Cisco FireSIGHT System Software | =5.4.1.3 | |
Cisco FireSIGHT System Software | =5.4.1.4 | |
Cisco FireSIGHT System Software | =6.0.0 | |
Cisco FireSIGHT System Software | =6.0.0.1 | |
Cisco FireSIGHT System Software | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-6427 is classified as high due to the potential for remote exploitation.
To fix CVE-2015-6427, upgrade your Cisco FireSIGHT Management Center to a version that is not affected, such as version 6.0.1 or later.
CVE-2015-6427 affects Cisco FireSIGHT System Software versions 5.3.0 through 6.0.0.
CVE-2015-6427 allows attackers to bypass HTTP attack detection, potentially leading to undetected malicious activities.
There are no recognized workarounds for CVE-2015-6427; updating to a secure version is recommended.