Vulnerability Details : CVE-2015-1637
Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204 and CVE-2015-1067.
Products affected by CVE-2015-1637
- cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1637
53.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1637
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2015-1637
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1637
-
https://technet.microsoft.com/library/security/3046015
Microsoft Security Advisory 3046015 | Microsoft DocsPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/72965
Microsoft Secure Channel CVE-2015-1637 Man in the Middle Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://freakattack.com/
The FREAK AttackVendor Advisory
-
http://web.archive.org/web/20150321220028/https://freakattack.com/
Tracking the FREAK Attack
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-031
Microsoft Security Bulletin MS15-031 - Important | Microsoft DocsPatch;Vendor Advisory
-
http://www.securitytracker.com/id/1031833
Windows Schannel TLS Export Cipher Bug Lets Remote Users Downgrade Session Security - SecurityTrackerThird Party Advisory;VDB Entry
Jump to