VAR-201512-0393

Vulnerability from variot - Updated: 2023-12-18 13:24

The random-number generator on Cisco Small Business RV routers 4.x and SA500 security appliances 2.2.07 does not have sufficient entropy, which makes it easier for remote attackers to determine a TLS key pair via unspecified computations upon handshake key-exchange data, aka Bug ID CSCus15224. Vendors have confirmed this vulnerability Bug ID CSCus15224 It is released as.Through unspecified calculations in the handshake of key exchange data by a third party, TLS Key pairs may be identified. The Cisco Small Business RV Series Routers provide virtual private network technology remotely. An attacker can exploit this issue to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks. This issue is being tracked by following Cisco Bug IDs: CSCus15224 CSCus15238 CSCus15436 CSCus15440 CSCus15446 CSCus15451 CSCus15463

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0393",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "rv082 dual wan vpn router",
        "scope": "eq",
        "trust": 2.7,
        "vendor": "cisco",
        "version": "4.0.2.8"
      },
      {
        "model": "rv082 dual wan vpn router",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "cisco",
        "version": "4.0.0.7"
      },
      {
        "model": "rv042 dual wan vpn router",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "cisco",
        "version": "4.0.2.8"
      },
      {
        "model": "sa520",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.2.07"
      },
      {
        "model": "rv016 multi-wan vpn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.0.0.7"
      },
      {
        "model": "rv042g dual gigabit wan vpn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.2.2.8"
      },
      {
        "model": "sa540",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.2.07"
      },
      {
        "model": "rv042g dual gigabit wan vpn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.0.0.7"
      },
      {
        "model": "rv016 multi-wan vpn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.0.5.0"
      },
      {
        "model": "rv042g dual gigabit wan vpn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.2.2.7"
      },
      {
        "model": "sa520w",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.2.07"
      },
      {
        "model": "rv016 multi-wan vpn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.0.2.8"
      },
      {
        "model": "rv042g dual gigabit wan vpn router",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "4.2.2.8"
      },
      {
        "model": "rv042g dual gigabit wan vpn router",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "4.2.2.7"
      },
      {
        "model": "rv042g dual gigabit wan vpn router",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "4.2.1.2"
      },
      {
        "model": "rv016 multi-wan vpn router",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "4.0.5.0"
      },
      {
        "model": "rv016 multi-wan vpn router",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "4.0.2.8"
      },
      {
        "model": "rv016 multi-wan vpn router",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "4.0.0.7"
      },
      {
        "model": "sa520 security appliance",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.2.07"
      },
      {
        "model": "sa520w security appliance",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.2.07"
      },
      {
        "model": "sa540 security appliance",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.2.07"
      },
      {
        "model": "small business rv",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4.x"
      },
      {
        "model": "sa540 security appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2.7"
      },
      {
        "model": "sa520w security appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2.7"
      },
      {
        "model": "sa520 security appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2.7"
      },
      {
        "model": "rv082 dual wan vpn router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.2.8"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      },
      {
        "db": "BID",
        "id": "78876"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6418"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-401"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:cisco:sa520:2.2.07:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:sa540:2.2.07:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:sa520w:2.2.07:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:rv082_dual_wan_vpn_router_firmware:4.0.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:rv042g_dual_gigabit_wan_vpn_firmware:4.0.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:rv016_multi-wan_vpn_firmware:4.0.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:rv016_multi-wan_vpn_firmware:4.0.2.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:rv042_dual_wan_vpn_router_firmware:4.0.2.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:rv082_dual_wan_vpn_router_firmware:4.0.2.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:rv016_multi-wan_vpn_firmware:4.0.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:rv042g_dual_gigabit_wan_vpn_firmware:4.2.2.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:rv042g_dual_gigabit_wan_vpn_firmware:4.2.2.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-6418"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "78876"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-6418",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2015-6418",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2015-08068",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-84379",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-6418",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-08068",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201512-401",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-84379",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2015-6418",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84379"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-6418"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6418"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-401"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The random-number generator on Cisco Small Business RV routers 4.x and SA500 security appliances 2.2.07 does not have sufficient entropy, which makes it easier for remote attackers to determine a TLS key pair via unspecified computations upon handshake key-exchange data, aka Bug ID CSCus15224. Vendors have confirmed this vulnerability Bug ID CSCus15224 It is released as.Through unspecified calculations in the handshake of key exchange data by a third party, TLS Key pairs may be identified. The Cisco Small Business RV Series Routers provide virtual private network technology remotely. \nAn attacker can exploit this issue to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks. \nThis issue is being tracked by following Cisco Bug IDs:\nCSCus15224\nCSCus15238\nCSCus15436\nCSCus15440\nCSCus15446\nCSCus15451\nCSCus15463",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-6418"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      },
      {
        "db": "BID",
        "id": "78876"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84379"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-6418"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-6418",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "78876",
        "trust": 2.1
      },
      {
        "db": "SECTRACK",
        "id": "1034409",
        "trust": 1.2
      },
      {
        "db": "SECTRACK",
        "id": "1034408",
        "trust": 1.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006398",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-401",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-08068",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-84379",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-6418",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84379"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-6418"
      },
      {
        "db": "BID",
        "id": "78876"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6418"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-401"
      }
    ]
  },
  "id": "VAR-201512-0393",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84379"
      }
    ],
    "trust": 1.2871463342857141
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:24:40.181000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20151210-dwvr",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151210-dwvr"
      },
      {
        "title": "Patch for Cisco Small Business RV Router Information Disclosure Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/68148"
      },
      {
        "title": "Cisco Small Business RV Series Routers  and SA500 Series Security Appliances Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=59216"
      },
      {
        "title": "Cisco: Cisco Small Business RV Series and SA500 Series Dual WAN VPN Router Generated Key Pair Information Disclosure Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20151210-dwvr"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-6418"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-401"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-84379"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6418"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151210-dwvr"
      },
      {
        "trust": 1.3,
        "url": "http://www.securityfocus.com/bid/78876"
      },
      {
        "trust": 1.2,
        "url": "http://www.securitytracker.com/id/1034408"
      },
      {
        "trust": 1.2,
        "url": "http://www.securitytracker.com/id/1034409"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6418"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6418"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/200.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84379"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-6418"
      },
      {
        "db": "BID",
        "id": "78876"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6418"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-401"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84379"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-6418"
      },
      {
        "db": "BID",
        "id": "78876"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6418"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-401"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-12-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      },
      {
        "date": "2015-12-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-84379"
      },
      {
        "date": "2015-12-13T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-6418"
      },
      {
        "date": "2015-12-10T00:00:00",
        "db": "BID",
        "id": "78876"
      },
      {
        "date": "2015-12-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      },
      {
        "date": "2015-12-13T03:59:09.477000",
        "db": "NVD",
        "id": "CVE-2015-6418"
      },
      {
        "date": "2015-12-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201512-401"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-12-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-08068"
      },
      {
        "date": "2016-12-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-84379"
      },
      {
        "date": "2016-12-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-6418"
      },
      {
        "date": "2015-12-10T00:00:00",
        "db": "BID",
        "id": "78876"
      },
      {
        "date": "2015-12-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      },
      {
        "date": "2016-12-07T18:20:12.883000",
        "db": "NVD",
        "id": "CVE-2015-6418"
      },
      {
        "date": "2015-12-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201512-401"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-401"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Small Business RV Router and  SA500 Security Appliance In the random number generator running on  TLS Vulnerabilities that identify key pairs",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006398"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-401"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…