ID |
CVE-2015-4550
|
Summary |
The Cavium cryptographic-module firmware on Cisco Adaptive Security Appliance (ASA) devices with software 9.3(3) and 9.4(1.1) does not verify the AES-GCM Integrity Check Value (ICV) octets, which makes it easier for man-in-the-middle attackers to spoof IPSec and IKEv2 traffic by modifying packet data, aka Bug ID CSCuu66218. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 4.3 (as of 11-08-2023 - 18:54) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-310 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
refmap
via4
|
bid | 75269 | cisco | 20150616 Cisco Adaptive Security Appliance Encrypted IPSec or IKEv2 Packet Modification Vulnerability | sectrack | 1032595 |
|
Last major update |
11-08-2023 - 18:54 |
Published |
17-06-2015 - 10:59 |
Last modified |
11-08-2023 - 18:54 |