CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
47.6%
A vulnerability in HTTP attack detection within decrypted SSL traffic of Cisco FireSIGHT Management Center could allow an unauthenticated, remote attacker to bypass HTTP attack detection. The traffic is SSL and the application is configured to decrypt the SSL connection and detect HTTP-based attacks that are associated with Snort intrusion detection rules.
# SPDX-FileCopyrightText: 2016 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:cisco:firesight_management_center";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.105499");
script_cve_id("CVE-2015-6427");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_version("2023-07-20T05:05:17+0000");
script_name("Cisco FireSIGHT Management Center SSL HTTP Attack Detection Vulnerability");
script_xref(name:"URL", value:"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151217-fsm");
script_tag(name:"impact", value:"An attacker could exploit this vulnerability by embedding crafted HTTP packets in an encrypted SSL connection that could be flagged as an HTTP attack. An exploit could allow the attacker to bypass HTTP attack rules for SSL connections.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The vulnerability is due to improper HTTP attack detection of decrypted SSL connections.");
script_tag(name:"solution", value:"No known solution was made available for at least one year since the disclosure of this vulnerability.
Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.");
script_tag(name:"summary", value:"A vulnerability in HTTP attack detection within decrypted SSL traffic of Cisco FireSIGHT Management Center could allow an unauthenticated, remote attacker to bypass HTTP attack detection. The traffic is SSL and the application is configured to decrypt the SSL connection and detect HTTP-based attacks that are associated with Snort intrusion detection rules.");
script_tag(name:"solution_type", value:"WillNotFix");
script_tag(name:"qod_type", value:"package");
script_tag(name:"last_modification", value:"2023-07-20 05:05:17 +0000 (Thu, 20 Jul 2023)");
script_tag(name:"creation_date", value:"2016-01-06 13:43:05 +0100 (Wed, 06 Jan 2016)");
script_category(ACT_GATHER_INFO);
script_family("CISCO");
script_copyright("Copyright (C) 2016 Greenbone AG");
script_dependencies("gb_cisco_firesight_management_center_version.nasl",
"gb_cisco_firesight_management_center_http_detect.nasl");
script_mandatory_keys("cisco_firesight_management_center/version");
exit(0);
}
include("host_details.inc");
if( ! version = get_app_version( cpe:CPE, nofork:TRUE ) ) exit( 0 );
affected = make_list(
'5.3.0',
'5.3.0.1',
'5.3.0.2',
'5.3.1.1',
'5.3.1.2',
'5.3.1.3',
'5.3.1',
'5.3.1.5',
'5.3.1.4',
'5.3.1.7',
'5.4.0',
'5.4.1',
'5.4.1.2',
'5.4.0.1',
'5.4.0.4',
'5.4.1.3',
'5.4.1.4',
'6.0.0',
'6.0.0.1',
'6.0.1' );
foreach af (affected) {
if (version == af) {
report = 'Installed version: ' + version + '\n' +
'Fixed version: None';
security_message( port:0, data:report );
exit( 0 );
}
}
exit( 99 );