Unknown
CVE-2015-2808
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the “Bar Mitzvah” issue.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Products
- 9700 firmware
- cognos metrics manager 10.1
- cognos metrics manager 10.1.1
- cognos metrics manager 10.2
- cognos metrics manager 10.2.1
- cognos metrics manager 10.2.2
- communications application session controller
- communications policy management
- debian linux 7.0
- debian linux 8.0
- e6000 firmware
- e9000 firmware
- enterprise linux desktop 5.0
- enterprise linux desktop 6.0
- enterprise linux desktop 7.0
- enterprise linux eus 6.6
- enterprise linux eus 7.1
- enterprise linux eus 7.2
- enterprise linux eus 7.3
- enterprise linux eus 7.4
- enterprise linux eus 7.5
- enterprise linux eus 7.6
- enterprise linux eus 7.7
- enterprise linux server 5.0
- enterprise linux server 6.0
- enterprise linux server 7.0
- enterprise linux server aus 6.6
- enterprise linux server aus 7.3
- enterprise linux server aus 7.4
- enterprise linux server aus 7.6
- enterprise linux server aus 7.7
- enterprise linux server tus 7.3
- enterprise linux server tus 7.6
- enterprise linux server tus 7.7
- enterprise linux workstation 5.0
- enterprise linux workstation 6.0
- enterprise linux workstation 7.0
- http server 11.1.1.7.0
- http server 11.1.1.9.0
- http server 12.1.3.0.0
- http server 12.2.1.1.0
- http server 12.2.1.2.0
- integrated lights out manager firmware
- linux enterprise debuginfo 11
- linux enterprise desktop 11
- linux enterprise desktop 12
- linux enterprise server 10
- linux enterprise server 11
- linux enterprise server 12
- linux enterprise software development kit 11
- linux enterprise software development kit 12
- manager 1.7
- oceanstor 18500 firmware
- oceanstor 18800 firmware
- oceanstor 18800f firmware
- oceanstor 9000 firmware
- oceanstor cse firmware
- oceanstor hvs85t firmware
- oceanstor replicationdirector v100r003c00
- oceanstor s2600t firmware
- oceanstor s5500t firmware
- oceanstor s5600t firmware
- oceanstor s5800t firmware
- oceanstor s6800t firmware
- oceanstor vis6600t firmware
- opensuse 13.1
- opensuse 13.2
- policy center v100r003c00
- policy center v100r003c10
- quidway s9300 firmware
- s12700 firmware
- s2700 firmware
- s2750 firmware
- s3700 firmware
- s5700ei firmware
- s5700hi firmware
- s5700li firmware
- s5700s li firmware
- s5700si firmware
- s5710ei firmware
- s5710hi firmware
- s5720ei firmware
- s5720hi firmware
- s6700 firmware
- s7700 firmware
- satellite 5.6
- satellite 5.7
- smc2.0 v100r002c01
- smc2.0 v100r002c02
- smc2.0 v100r002c03
- smc2.0 v100r002c04
- sparc enterprise m3000 firmware
- sparc enterprise m4000 firmware
- sparc enterprise m5000 firmware
- sparc enterprise m8000 firmware
- sparc enterprise m9000 firmware
- te60 firmware
- ubuntu linux 12.04
- ubuntu linux 14.04
- ubuntu linux 15.04
- ultravr v100r003c00
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: