ID

VAR-201506-0304


CVE

CVE-2015-4216


TITLE

plural Cisco Vulnerabilities that prevent authentication in the remote support function of security virtual appliances

Trust: 0.8

sources: JVNDB: JVNDB-2015-003283

DESCRIPTION

The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630. SSH of root There is a vulnerability that bypasses authentication because it uses the same key that was authenticated with. Vendors have confirmed this vulnerability Bug ID CSCuu95988 , CSCuu95994 ,and CSCuu96630 It is released as.Authentication may be avoided by using a private key information obtained from another customer's installation by a third party. Multiple Cisco products are prone to a privilege-escalation vulnerability. This issue is being tracked by Cisco Bug ID's CSCuu95988, CSCuu95994, and CSCuu96630

Trust: 2.52

sources: NVD: CVE-2015-4216 // JVNDB: JVNDB-2015-003283 // CNVD: CNVD-2015-04097 // BID: 75417 // VULHUB: VHN-82177

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-04097

AFFECTED PRODUCTS

vendor:ciscomodel:web security virtual appliancescope:eqversion:8.0.5

Trust: 1.9

vendor:ciscomodel:web security virtual appliancescope:eqversion:7.7.5

Trust: 1.9

vendor:ciscomodel:email security virtual appliancescope:eqversion:8.5.7

Trust: 1.9

vendor:ciscomodel:email security virtual appliancescope:eqversion:8.5.6

Trust: 1.9

vendor:ciscomodel:content security management virtual appliancescope:eqversion:9.0.0.087

Trust: 1.9

vendor:ciscomodel:content security management virtual appliancescope:eqversion:8.4.0.0150

Trust: 1.9

vendor:ciscomodel:web security virtual appliancescope:eqversion:8.6.0

Trust: 1.6

vendor:ciscomodel:email security virtual appliancescope:eqversion:9.0.0

Trust: 1.6

vendor:ciscomodel:web security virtual appliancescope:eqversion:8.7.0

Trust: 1.6

vendor:ciscomodel:email security virtual appliancescope:eqversion:8.0.0

Trust: 1.6

vendor:ciscomodel:web security virtual appliancescope:eqversion:8.5.1

Trust: 1.3

vendor:ciscomodel:web security virtual appliancescope:eqversion:8.5.0

Trust: 1.0

vendor:ciscomodel:e email security virtual appliancescope:ltversion:2015.6.25 earlier

Trust: 0.8

vendor:ciscomodel:web security virtual appliancescope:ltversion:2015.6.25 earlier

Trust: 0.8

vendor:ciscomodel:content security management virtual appliancescope:ltversion:2015.6.25 earlier

Trust: 0.8

vendor:ciscomodel:web security virtual appliancescope: - version: -

Trust: 0.6

vendor:ciscomodel:email security virtual appliancescope: - version: -

Trust: 0.6

vendor:ciscomodel:security management virtual appliance devicesscope:ltversion:2015-06-25

Trust: 0.6

vendor:ciscomodel:web security virtual appliancescope:eqversion:8.7

Trust: 0.3

vendor:ciscomodel:web security virtual appliancescope:eqversion:8.6

Trust: 0.3

vendor:ciscomodel:web security virtual appliancescope:eqversion:8.5

Trust: 0.3

vendor:ciscomodel:email security virtual appliancescope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:email security virtual appliancescope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:email security virtual appliancescope:eqversion:8.0

Trust: 0.3

sources: CNVD: CNVD-2015-04097 // BID: 75417 // JVNDB: JVNDB-2015-003283 // CNNVD: CNNVD-201506-572 // NVD: CVE-2015-4216

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4216
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-4216
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-04097
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201506-572
value: MEDIUM

Trust: 0.6

VULHUB: VHN-82177
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-4216
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-04097
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-82177
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-04097 // VULHUB: VHN-82177 // JVNDB: JVNDB-2015-003283 // CNNVD: CNNVD-201506-572 // NVD: CVE-2015-4216

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-82177 // JVNDB: JVNDB-2015-003283 // NVD: CVE-2015-4216

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201506-572

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201506-572

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003283

PATCH

title:cisco-sa-20150625-ironporturl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150625-ironport

Trust: 0.8

title:39462url:http://tools.cisco.com/security/center/viewAlert.x?alertId=39462

Trust: 0.8

title:cisco-sa-20150625-ironporturl:http://www.cisco.com/cisco/web/support/JP/113/1130/1130064_cisco-sa-20150625-ironport-j.html

Trust: 0.8

title:Cisco Virtual WSA/ESA/SMA defaults to patching SSH key vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/60160

Trust: 0.6

sources: CNVD: CNVD-2015-04097 // JVNDB: JVNDB-2015-003283

EXTERNAL IDS

db:NVDid:CVE-2015-4216

Trust: 3.4

db:BIDid:75417

Trust: 1.4

db:SECTRACKid:1032725

Trust: 1.1

db:SECTRACKid:1032726

Trust: 1.1

db:JVNDBid:JVNDB-2015-003283

Trust: 0.8

db:CNNVDid:CNNVD-201506-572

Trust: 0.7

db:CNVDid:CNVD-2015-04097

Trust: 0.6

db:VULHUBid:VHN-82177

Trust: 0.1

sources: CNVD: CNVD-2015-04097 // VULHUB: VHN-82177 // BID: 75417 // JVNDB: JVNDB-2015-003283 // CNNVD: CNNVD-201506-572 // NVD: CVE-2015-4216

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150625-ironport

Trust: 2.6

url:http://www.securityfocus.com/bid/75417

Trust: 1.1

url:http://www.securitytracker.com/id/1032725

Trust: 1.1

url:http://www.securitytracker.com/id/1032726

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4216

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4216

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=39462

Trust: 0.3

sources: CNVD: CNVD-2015-04097 // VULHUB: VHN-82177 // BID: 75417 // JVNDB: JVNDB-2015-003283 // CNNVD: CNNVD-201506-572 // NVD: CVE-2015-4216

CREDITS

Cisco

Trust: 0.3

sources: BID: 75417

SOURCES

db:CNVDid:CNVD-2015-04097
db:VULHUBid:VHN-82177
db:BIDid:75417
db:JVNDBid:JVNDB-2015-003283
db:CNNVDid:CNNVD-201506-572
db:NVDid:CVE-2015-4216

LAST UPDATE DATE

2025-04-13T23:04:15.288000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-04097date:2015-06-30T00:00:00
db:VULHUBid:VHN-82177date:2016-12-28T00:00:00
db:BIDid:75417date:2015-06-25T00:00:00
db:JVNDBid:JVNDB-2015-003283date:2015-07-06T00:00:00
db:CNNVDid:CNNVD-201506-572date:2015-06-29T00:00:00
db:NVDid:CVE-2015-4216date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-04097date:2015-06-30T00:00:00
db:VULHUBid:VHN-82177date:2015-06-26T00:00:00
db:BIDid:75417date:2015-06-25T00:00:00
db:JVNDBid:JVNDB-2015-003283date:2015-06-29T00:00:00
db:CNNVDid:CNNVD-201506-572date:2015-06-29T00:00:00
db:NVDid:CVE-2015-4216date:2015-06-26T10:59:03.327