Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2015-7575 |
CWE-ID | CWE-19 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
IBM BladeCenter 1/10Gb Uplink Ethernet Switch Module Hardware solutions / Routers & switches, VoIP, GSM, etc IBM BladeCenter Virtual Fabric 10Gb Switch Module Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU33638
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2015-7575
CWE-ID:
CWE-19 - Data Handling
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
MitigationInstall update from vendor's website.
Vulnerable software versionsIBM BladeCenter 1/10Gb Uplink Ethernet Switch Module: before 6.8.24.0
IBM BladeCenter Virtual Fabric 10Gb Switch Module: before 6.8.24.0
CPE2.3https://www.ibm.com/support/pages/node/868494
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.