6.4
CVSSv2

CVE-2012-5575

Published: 19/08/2013 Updated: 13/02/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 571
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Apache CXF 2.5.x prior to 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote malicious users to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka "XML Encryption backwards compatibility attack."

Vulnerable Product Search on Vulmon Subscribe to Product

apache cxf 2.5.2

apache cxf 2.5.9

redhat jboss enterprise web platform 5.2.0

redhat jboss enterprise soa platform 4.3.0

apache cxf 2.6.0

apache cxf 2.5.3

apache cxf 2.7.3

apache cxf 2.5.7

redhat jboss fuse esb enterprise 7.1.0

apache cxf 2.6.2

apache cxf 2.5.0

apache cxf 2.5.1

apache cxf 2.5.5

apache cxf 2.5.8

apache cxf 2.6.5

apache cxf 2.7.0

apache cxf 2.6.6

apache cxf 2.6.3

redhat jboss enterprise portal platform 4.3.0

apache cxf 2.5.6

apache cxf 2.6.4

apache cxf 2.6.1

apache cxf 2.7.1

redhat jboss enterprise application platform 5.0.0

apache cxf 2.5.4

apache cxf 2.7.2

References

CWE-310http://rhn.redhat.com/errata/RHSA-2013-0876.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0943.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0873.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=880443http://www.securityfocus.com/bid/60043http://rhn.redhat.com/errata/RHSA-2013-1028.htmlhttp://rhn.redhat.com/errata/RHSA-2013-1143.htmlhttp://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/http://rhn.redhat.com/errata/RHSA-2013-0874.htmlhttp://cxf.apache.org/cve-2012-5575.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0875.htmlhttp://rhn.redhat.com/errata/RHSA-2013-1437.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0833.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0839.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0834.htmlhttps://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3Ehttps://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3Ehttps://nvd.nist.gov