Vulnerability Details : CVE-2016-1404
Cisco UCS Invicta 4.3, 4.5, and 5.0.1 on Invicta appliances and Invicta Scaling System uses the same hardcoded GnuPG encryption key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by sniffing network traffic to an Autosupport server and leveraging knowledge of this key from another installation, aka Bug ID CSCur85504.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2016-1404
Probability of exploitation activity in the next 30 days: 0.18%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 54 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-1404
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-1404
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1404
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160524-ucs-inv
Cisco UCS Invicta Software Default GPG Key VulnerabilityVendor Advisory
-
http://www.securitytracker.com/id/1035957
Cisco UCS Invicta Default GPG Key Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker
Products affected by CVE-2016-1404
- cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:4.5_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:4.3_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:5.0_base:*:*:*:*:*:*:*