Vulnerability Details : CVE-2012-4072
The KVM subsystem in Cisco Unified Computing System (UCS) relies on a hardcoded X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers, and read keyboard and mouse events, by leveraging knowledge of this certificate's private key, aka Bug ID CSCte90327.
Products affected by CVE-2012-4072
- cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-4072
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-4072
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2012-4072
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4072
-
http://www.securitytracker.com/id/1029067
Cisco Unified Computing System Hardcoded SSL Certificate Lets Remote Users Spoof KVM Hosts - SecurityTrackerThird Party Advisory;VDB Entry
-
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4072
Cisco Unified Computing System Software KVM Encryption VulnerabilityVendor Advisory
Jump to