First published: Wed Sep 21 2016(Updated: )
The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IETF Transport Layer Security | <=1.2 | |
Apple Mobile Safari | ||
Google Chrome | ||
Internet Explorer | ||
Mozilla Firefox | ||
Opera | ||
netapp clustered data ontap antivirus connector | ||
NetApp Data ONTAP Edge | ||
netapp host agent | ||
NetApp OnCommand Shift | ||
netapp plug-in for symantec netbackup | ||
netapp smi-s provider | ||
NetApp Snap Creator Framework | ||
NetApp SnapDrive for Unix | ||
netapp snapdrive windows | ||
netapp snapmanager Oracle | ||
netapp snapmanager sap | ||
NetApp SnapProtect | ||
netapp solidfire \& hci management node | ||
NetApp System Setup |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8960 has a medium severity rating due to the potential risk of cryptographic vulnerabilities in the TLS protocol.
To fix CVE-2015-8960, update to a version of the TLS protocol that addresses the identified weaknesses, typically by upgrading to TLS 1.3 or later.
CVE-2015-8960 affects the IETF Transport Layer Security up to version 1.2, as well as certain NetApp software products.
CVE-2015-8960 is not universally exploitable and may depend on specific configurations and implementations of TLS.
The implications of CVE-2015-8960 for secure communications include potential exposure to attacks that could compromise the confidentiality and integrity of data transmitted over TLS.