Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ph23-3mhm-w392

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The KVM subsystem in Cisco Unified Computing System (UCS) relies on a hardcoded X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers, and read keyboard and mouse events, by leveraging knowledge of this certificate's private key, aka Bug ID CSCte90327.

The KVM subsystem in Cisco Unified Computing System (UCS) relies on a hardcoded X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers, and read keyboard and mouse events, by leveraging knowledge of this certificate's private key, aka Bug ID CSCte90327.

EPSS

Процентиль: 40%
0.00181
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 12 лет назад

The KVM subsystem in Cisco Unified Computing System (UCS) relies on a hardcoded X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers, and read keyboard and mouse events, by leveraging knowledge of this certificate's private key, aka Bug ID CSCte90327.

EPSS

Процентиль: 40%
0.00181
Низкий

Дефекты

CWE-20