CVE-2015-6358

moderate-risk
Published 2017-10-12

Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913.

Do I need to act?

~
2.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10 Medium
NETWORK / HIGH complexity

Affected Products (20)

Rvs4000 Firmware
Wvc2300 Firmware
Pvc2300 Firmware
Wap2000 Firmware
Wap4400N Firmware
Rv120W Firmware
Rv180 Firmware
Rv180W Firmware
Rv315W Firmware
Srp520 Firmware
Wrv210 Firmware
Wap4410N Firmware
Wrv200 Firmware
Wrvs4400N Firmware
Wap200 Firmware
Srw224P Firmware
Wet200 Firmware
Srp520-U Firmware

Affected Vendors

44
/ 100
moderate-risk
Severity 18/34 · Moderate
Exploitability 5/34 · Minimal
Exposure 21/34 · High