HomeIetfCVE-2015-8960

CVE-2015-8960

HIGH
8.1CVSS
Published: 2016-09-21
Updated: 2025-04-12
AI Analysis

Description

The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-295

Metadata

Primary Vendor
IETF
Published
9/21/2016
Last Modified
4/12/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

ietf : transport_layer_securitynetapp : clustered_data_ontap_antivirus_connectornetapp : data_ontap_edgenetapp : host_agentnetapp : oncommand_shiftnetapp : plug-in_for_symantec_netbackupnetapp : smi-s_providernetapp : snap_creator_frameworknetapp : snapdrivenetapp : snapdrivenetapp : snapmanagernetapp : snapmanagernetapp : snapprotectnetapp : solidfire_\&_hci_management_nodenetapp : system_setup

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2015-8960 | HIGH Severity | CVEDatabase.com | CVEDatabase.com