6.8
CVSSv2

CVE-2015-6357

Published: 18/11/2015 Updated: 09/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The rule-update feature in Cisco FireSIGHT Management Center (MC) 5.2 up to and including 5.4.0.1 does not verify the X.509 certificate of the support.sourcefire.com SSL server, which allows man-in-the-middle malicious users to spoof this server and provide an invalid package, and consequently execute arbitrary code, via a crafted certificate, aka Bug ID CSCuw06444.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco firesight system software 5.3.1.1

cisco firesight system software 5.3.1.2

cisco firesight system software 5.4.0.1

cisco firesight system software 5.2.0

cisco firesight system software 5.3.0

cisco firesight system software 5.3.1.5

cisco firesight system software 5.4.0

Vendor Advisories

A vulnerability in the rule update functionality of Cisco FireSIGHT Management Center (MC) could allow an unauthenticated, remote attacker to manipulate the content of the rule update packages and execute arbitrary code on the system The vulnerability is due to lack of certificate validation during the HTTPS connection toward supportsourcefire ...

Github Repositories

Exploit for CVE-2015-6357 Cisco FireSIGHT Management Center Certificate Validation Vulnerability

CVE-2015-6357: FirePWNER Exploit for Cisco FireSIGHT Management Center SSL Validation Vulnerability Introduction On its own the Cisco FireSIGHT Management Center Certificate Validation Vulnerability is a medium severity vulnerability with a CVSS of 51 However, this vulnerability is an example of why SSL certificate validation is so important In this exploit I will demonstrat