Описание
RSA BSAFE SSL-J 3.0, 3.0.1 and 3.1, as used in Cisco iCND 2.0, caches session IDs from failed login attempts, which could allow remote attackers to bypass SSL client authentication and gain access to sensitive data by logging in after an initial failure.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:cisco:icdn:2.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00797
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
RSA BSAFE SSL-J 3.0, 3.0.1 and 3.1, as used in Cisco iCND 2.0, caches session IDs from failed login attempts, which could allow remote attackers to bypass SSL client authentication and gain access to sensitive data by logging in after an initial failure.
EPSS
Процентиль: 73%
0.00797
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other