Vulnerability Details : CVE-2015-2077
Potential exploit
The SDK for Komodia Redirector with SSL Digestor, as used in Lavasoft Ad-Aware Web Companion 1.1.885.1766 and Ad-Aware AdBlocker (alpha) 1.3.69.1, Qustodio for Windows, Atom Security, Inc. StaffCop 5.8, and other products, uses the same X.509 certificate private key for a root CA certificate across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging knowledge of this key, as originally reported for Superfish VisualDiscovery on certain Lenovo Notebook laptop products.
Products affected by CVE-2015-2077
- cpe:2.3:a:komodia:redirector_sdk:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-2077
1.55%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-2077
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2015-2077
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-2077
-
http://marcrogers.org/2015/02/19/lenovo-installs-adware-on-customer-laptops-and-compromises-all-ssl/
Lenovo installs adware on customer laptops and compromises ALL SSL. | Marc's Security Ramblings
-
http://www.us-cert.gov/cas/techalerts/TA15-051A.html
Lenovo Superfish Adware Vulnerable to HTTPS Spoofing | CISAThird Party Advisory;US Government Resource
-
http://www.kb.cert.org/vuls/id/529496
VU#529496 - Komodia Redirector with SSL Digestor fails to properly validate SSL and installs non-unique root CA certificates and private keysThird Party Advisory;US Government Resource
-
http://www.securitytracker.com/id/1031779
Lenovo Notebook Pre-Installed Software Lets Remote Users Spoof SSL Servers and Decrypt SSL Sessions - SecurityTracker
-
http://news.lenovo.com/article_display.cfm?article_id=1929
Page not found | Lenovo StoryHub Lenovo's official site for press materials and original stories about the vision and passion behind the technology.
-
http://www.theguardian.com/technology/2015/feb/19/lenovo-accused-compromising-user-security-installing-adware-pcs-superfish
Lenovo accused of compromising user security by installing adware on new PCs | Technology | The Guardian
-
http://blog.erratasec.com/2015/02/some-notes-on-superfish.html#.VOq6Yvn8Fp4
Errata Security
-
http://support.lenovo.com/us/en/product_security/superfish
SuperFish Vulnerability - US
-
http://www.wired.com/2015/02/lenovo-superfish/
Lenovo's Response to Its Dangerous Adware Is Astonishingly Clueless | WIRED
-
http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html#.VOq6Yfn8Fp4
Errata Security: Extracting the SuperFish certificateExploit
-
https://www.facebook.com/notes/protect-the-graph/windows-ssl-interception-gone-wild/1570074729899339
Windows SSL Interception Gone Wild | Facebook
-
http://www.securityfocus.com/bid/72693
Komodia Redirector SSL Certificate Validation Spoofing Vulnerability
-
https://blog.filippo.io/komodia-superfish-ssl-validation-is-broken/
Komodia/Superfish SSL Validation is brokenExploit
Jump to