First published: Fri Dec 18 2015(Updated: )
Cisco FireSIGHT Management Center allows remote attackers to bypass the HTTP attack detection feature and avoid triggering Snort IDS rules via an SSL session that is mishandled after decryption, aka Bug ID CSCux53437.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FireSIGHT System Software | =5.3.0 | |
Cisco FireSIGHT System Software | =5.3.0.1 | |
Cisco FireSIGHT System Software | =5.3.0.2 | |
Cisco FireSIGHT System Software | =5.3.1 | |
Cisco FireSIGHT System Software | =5.3.1.1 | |
Cisco FireSIGHT System Software | =5.3.1.2 | |
Cisco FireSIGHT System Software | =5.3.1.3 | |
Cisco FireSIGHT System Software | =5.3.1.4 | |
Cisco FireSIGHT System Software | =5.3.1.5 | |
Cisco FireSIGHT System Software | =5.3.1.7 | |
Cisco FireSIGHT System Software | =5.4.0 | |
Cisco FireSIGHT System Software | =5.4.0.1 | |
Cisco FireSIGHT System Software | =5.4.0.4 | |
Cisco FireSIGHT System Software | =5.4.1 | |
Cisco FireSIGHT System Software | =5.4.1.2 | |
Cisco FireSIGHT System Software | =5.4.1.3 | |
Cisco FireSIGHT System Software | =5.4.1.4 | |
Cisco FireSIGHT System Software | =6.0.0 | |
Cisco FireSIGHT System Software | =6.0.0.1 | |
Cisco FireSIGHT System Software | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.