Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:broadcom:ssl_visibility_appliance:3.8.4fc:*:*:*:*:*:*:*", "matchCriteriaId": "5207441A-FB6D-400F-9151-012DCF01885B", "vulnerable": true}, {"criteria": "cpe:2.3:a:broadcom:ssl_visibility_appliance:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "629C7D06-4DD7-478E-831D-4F6DB9DFF8AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:broadcom:ssl_visibility_appliance:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "B231AB3B-4BFD-4A7A-928C-CDF23FD21D48", "vulnerable": true}, {"criteria": "cpe:2.3:a:broadcom:ssl_visibility_appliance:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "52526D68-F66D-459B-A007-F32BEAFB5CA8", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Symantec SSL Visibility (SSLV) 3.8.4FC, 3.10 prior to 3.10.4.1, 3.11, and 3.12 prior to 3.12.2.1 are vulnerable to the Return of the Bleichenbacher Oracle Threat (ROBOT) attack. All affected SSLV versions act as weak oracles according the oracle classification used in the ROBOT research paper. A remote attacker, who has captured a pre-recorded SSL session inspected by SSLV, can establish multiple millions of crafted SSL connections to the target and obtain the session keys required to decrypt the pre-recorded SSL session."}, {"lang": "es", "value": "Symantec SSL Visibility (SSLV) 3.8.4FC, versiones 3.10 anteriores a la 3.10.4.1, 3.11, y versiones 3.12 anteriores a la 3.12.2.1 son vulnerables a un ataque ROBOT (Return of the Bleichenbacher Oracle Threat). Todas las versiones afectadas de SSLV act\u00faan como or\u00e1culos d\u00e9biles, seg\u00fan la clasificaci\u00f3n de or\u00e1culos empleada en el documento de investigaci\u00f3n de ROBOT. Un atacante remoto que haya capturado una sesi\u00f3n SSL previamente grabada inspeccionada por SSLV puede establecer millones de conexiones SSL manipuladas en el objetivo y obtener las claves de sesi\u00f3n necesarias para descifrar la sesi\u00f3n SSL pregrabada."}], "id": "CVE-2017-15533", "lastModified": "2024-11-21T03:14:44.040", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-05-17T13:29:00.210", "references": [{"source": "secure@symantec.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/104163"}, {"source": "secure@symantec.com", "tags": ["Vendor Advisory"], "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA160"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/104163"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA160"}], "sourceIdentifier": "secure@symantec.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-203"}], "source": "nvd@nist.gov", "type": "Primary"}]}