CVE-2015-3324 (GCVE-0-2015-3324)
Vulnerability from cvelistv5 – Published: 2015-04-16 23:00 – Updated: 2024-08-06 05:47
VLAI?
Summary
The ThinkServer System Manager (TSM) Baseboard Management Controller before firmware 1.27.73476 for ThinkServer RD350, RD450, RD550, RD650, and TD350 does not validate server certificates during an "encrypted remote KVM session," which allows man-in-the-middle attackers to spoof servers.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T05:47:57.335Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "74199",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/74199"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.lenovo.com/us/en/product_security/tsm_weak_pw"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The ThinkServer System Manager (TSM) Baseboard Management Controller before firmware 1.27.73476 for ThinkServer RD350, RD450, RD550, RD650, and TD350 does not validate server certificates during an \"encrypted remote KVM session,\" which allows man-in-the-middle attackers to spoof servers."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-02T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "74199",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/74199"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.lenovo.com/us/en/product_security/tsm_weak_pw"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-3324",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The ThinkServer System Manager (TSM) Baseboard Management Controller before firmware 1.27.73476 for ThinkServer RD350, RD450, RD550, RD650, and TD350 does not validate server certificates during an \"encrypted remote KVM session,\" which allows man-in-the-middle attackers to spoof servers."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "74199",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74199"
},
{
"name": "http://support.lenovo.com/us/en/product_security/tsm_weak_pw",
"refsource": "CONFIRM",
"url": "http://support.lenovo.com/us/en/product_security/tsm_weak_pw"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-3324",
"datePublished": "2015-04-16T23:00:00",
"dateReserved": "2015-04-16T00:00:00",
"dateUpdated": "2024-08-06T05:47:57.335Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:lenovo:thinkserver_system_manager_baseboard_management_controller_firmware:118.71532:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8503502C-DE2B-4ABB-A0F5-5854AB3E4CBB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:lenovo:thinkserver_rd350:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A988370E-47F4-4DC3-91AB-025360D07160\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:lenovo:thinkserver_rd450:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B994FC89-D6B6-4191-BC53-A36211DE94F8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:lenovo:thinkserver_rd550:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BDCBFD8-D031-4034-AEF9-6F31CC1C5814\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:lenovo:thinkserver_rd650:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2211D4D-0EB0-4E15-83D5-E94138D68284\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:lenovo:thinkserver_td350:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83BDBAD4-5483-4D37-A727-D5FE876FF26E\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The ThinkServer System Manager (TSM) Baseboard Management Controller before firmware 1.27.73476 for ThinkServer RD350, RD450, RD550, RD650, and TD350 does not validate server certificates during an \\\"encrypted remote KVM session,\\\" which allows man-in-the-middle attackers to spoof servers.\"}, {\"lang\": \"es\", \"value\": \"ThinkServer System Manager (TSM) Baseboard Management Controller anterior a firmware 1.27.73476 para ThinkServer RD350, RD450, RD550, RD650, y TD350 no valida los certificados de servidores durante una \u0027sesi\\u00f3n KVM remota codificada,\u0027 lo que permite a atacantes man-in-the-middle falsificar servidores.\"}]",
"id": "CVE-2015-3324",
"lastModified": "2024-11-21T02:29:09.820",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2015-04-16T23:59:05.540",
"references": "[{\"url\": \"http://support.lenovo.com/us/en/product_security/tsm_weak_pw\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/74199\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.lenovo.com/us/en/product_security/tsm_weak_pw\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/74199\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-310\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2015-3324\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-04-16T23:59:05.540\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ThinkServer System Manager (TSM) Baseboard Management Controller before firmware 1.27.73476 for ThinkServer RD350, RD450, RD550, RD650, and TD350 does not validate server certificates during an \\\"encrypted remote KVM session,\\\" which allows man-in-the-middle attackers to spoof servers.\"},{\"lang\":\"es\",\"value\":\"ThinkServer System Manager (TSM) Baseboard Management Controller anterior a firmware 1.27.73476 para ThinkServer RD350, RD450, RD550, RD650, y TD350 no valida los certificados de servidores durante una \u0027sesi\u00f3n KVM remota codificada,\u0027 lo que permite a atacantes man-in-the-middle falsificar servidores.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkserver_system_manager_baseboard_management_controller_firmware:118.71532:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8503502C-DE2B-4ABB-A0F5-5854AB3E4CBB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkserver_rd350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A988370E-47F4-4DC3-91AB-025360D07160\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkserver_rd450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B994FC89-D6B6-4191-BC53-A36211DE94F8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkserver_rd550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDCBFD8-D031-4034-AEF9-6F31CC1C5814\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkserver_rd650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2211D4D-0EB0-4E15-83D5-E94138D68284\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkserver_td350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83BDBAD4-5483-4D37-A727-D5FE876FF26E\"}]}]}],\"references\":[{\"url\":\"http://support.lenovo.com/us/en/product_security/tsm_weak_pw\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/74199\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.lenovo.com/us/en/product_security/tsm_weak_pw\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/74199\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…