4.3
CVSSv2

CVE-2015-6418

Published: 13/12/2015 Updated: 07/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The random-number generator on Cisco Small Business RV routers 4.x and SA500 security appliances 2.2.07 does not have sufficient entropy, which makes it easier for remote malicious users to determine a TLS key pair via unspecified computations upon handshake key-exchange data, aka Bug ID CSCus15224.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco sa520 2.2.07

cisco sa540 2.2.07

cisco sa520w 2.2.07

cisco rv082 dual wan vpn router firmware 4.0.0.7

cisco rv042g dual gigabit wan vpn firmware 4.0.0.7

cisco rv016 multi-wan vpn firmware 4.0.0.7

cisco rv016 multi-wan vpn firmware 4.0.2.8

cisco rv042 dual wan vpn router firmware 4.0.2.8

cisco rv082 dual wan vpn router firmware 4.0.2.8

cisco rv016 multi-wan vpn firmware 4.0.5.0

cisco rv042g dual gigabit wan vpn firmware 4.2.2.7

cisco rv042g dual gigabit wan vpn firmware 4.2.2.8

Vendor Advisories

A vulnerability in the HTTPS session key exchange process of certain Cisco Small Business RV Series Routers and Cisco SA500 Series Security Appliances could allow an unauthenticated, remote attacker to obtain the key pair used in the Transport Layer Security (TLS) session from the affected device The vulnerability is due to insufficient sources o ...