ID

VAR-201509-0023


CVE

CVE-2015-6303


TITLE

For mobile operating systems Cisco Spark Application vulnerabilities impersonating servers

Trust: 0.8

sources: JVNDB: JVNDB-2015-004955

DESCRIPTION

The Cisco Spark application 2015-07-04 for mobile operating systems does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate, aka Bug IDs CSCut36742 and CSCut36844. Vendors have confirmed this vulnerability Bug ID CSCut36742 ,and CSCut36844 It is released as.Man-in-the-middle attacks (man-in-the-middle attack) May masquerade as a server through a crafted certificate and retrieve important information. Cisco Spark is prone to an information-disclosure vulnerability. An attacker can exploit this issue to perform man-in-the-middle attacks and obtain sensitive information. Successful exploits will lead to other attacks. This issue is being tracked by Cisco Bug IDs CSCut36742 and CSCut36844. By providing a virtual space, the solution allows teams at any location to work together, call and video, discuss issues, store team files and documents, etc

Trust: 1.98

sources: NVD: CVE-2015-6303 // JVNDB: JVNDB-2015-004955 // BID: 76818 // VULHUB: VHN-84264

AFFECTED PRODUCTS

vendor:ciscomodel:sparkscope:eqversion:2015-07-04_base

Trust: 1.6

vendor:ciscomodel:sparkscope:eqversion:2015-07-04 base

Trust: 0.8

vendor:ciscomodel:sparkscope:eqversion:2015-07-04

Trust: 0.3

sources: BID: 76818 // JVNDB: JVNDB-2015-004955 // CNNVD: CNNVD-201509-534 // NVD: CVE-2015-6303

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6303
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-6303
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201509-534
value: MEDIUM

Trust: 0.6

VULHUB: VHN-84264
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-6303
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-84264
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-84264 // JVNDB: JVNDB-2015-004955 // CNNVD: CNNVD-201509-534 // NVD: CVE-2015-6303

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-84264 // JVNDB: JVNDB-2015-004955 // NVD: CVE-2015-6303

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201509-534

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201509-534

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004955

PATCH

title:41127url:http://tools.cisco.com/security/center/viewAlert.x?alertId=41127

Trust: 0.8

sources: JVNDB: JVNDB-2015-004955

EXTERNAL IDS

db:NVDid:CVE-2015-6303

Trust: 2.8

db:JVNDBid:JVNDB-2015-004955

Trust: 0.8

db:CNNVDid:CNNVD-201509-534

Trust: 0.6

db:BIDid:76818

Trust: 0.4

db:VULHUBid:VHN-84264

Trust: 0.1

sources: VULHUB: VHN-84264 // BID: 76818 // JVNDB: JVNDB-2015-004955 // CNNVD: CNNVD-201509-534 // NVD: CVE-2015-6303

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=41127

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6303

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6303

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.webex.com/ciscospark/index.html

Trust: 0.3

sources: VULHUB: VHN-84264 // BID: 76818 // JVNDB: JVNDB-2015-004955 // CNNVD: CNNVD-201509-534 // NVD: CVE-2015-6303

CREDITS

Cisco

Trust: 0.3

sources: BID: 76818

SOURCES

db:VULHUBid:VHN-84264
db:BIDid:76818
db:JVNDBid:JVNDB-2015-004955
db:CNNVDid:CNNVD-201509-534
db:NVDid:CVE-2015-6303

LAST UPDATE DATE

2025-04-12T23:18:48.039000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-84264date:2015-09-24T00:00:00
db:BIDid:76818date:2015-09-22T00:00:00
db:JVNDBid:JVNDB-2015-004955date:2015-09-30T00:00:00
db:CNNVDid:CNNVD-201509-534date:2015-09-25T00:00:00
db:NVDid:CVE-2015-6303date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-84264date:2015-09-24T00:00:00
db:BIDid:76818date:2015-09-22T00:00:00
db:JVNDBid:JVNDB-2015-004955date:2015-09-30T00:00:00
db:CNNVDid:CNNVD-201509-534date:2015-09-25T00:00:00
db:NVDid:CVE-2015-6303date:2015-09-24T14:59:00.123