CVE-2015-8798
CVSS V2 High 7.7
CVSS V3 High 8
Description
Directory traversal vulnerability in the Management Server in Symantec Embedded Security: Critical System Protection (SES:CSP) 1.0.x before 1.0 MP5, Embedded Security: Critical System Protection for Controllers and Devices (SES:CSP) 6.5.0 before MP1, Critical System Protection (SCSP) before 5.2.9 MP6, Data Center Security: Server Advanced Server (DCS:SA) 6.x before 6.5 MP1 and 6.6 before MP1, and Data Center Security: Server Advanced Server and Agents (DCS:SA) through 6.6 MP1 allows remote authenticated users to execute arbitrary code via unspecified vectors.
Overview
- CVE ID
- CVE-2015-8798
- Assigner
- secure@symantec.com
- Vulnerability Status
- Analyzed
- Published Version
- 2016-06-08T14:59:06
- Last Modified Date
- 2021-09-09T17:06:57
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:broadcom:symantec_critical_system_protection:*:*:*:*:*:*:*:* | 1 | OR | 5.2.9 | |
cpe:2.3:a:broadcom:symantec_data_center_security_server:6.5.0:*:*:*:advanced:*:*:* | 1 | OR | ||
cpe:2.3:a:broadcom:symantec_data_center_security_server:6.6.0:*:*:*:advanced:*:*:* | 1 | OR | ||
cpe:2.3:a:broadcom:symantec_data_center_security_server_and_agents:*:*:*:*:advanced:*:*:* | 1 | OR | 6.6.0 | |
cpe:2.3:o:broadcom:symantec_embedded_security_critical_system_protection:*:*:*:*:*:*:*:* | 1 | OR | 1.0 | |
cpe:2.3:o:broadcom:symantec_embedded_security_critical_system_protection_for_controllers_and_devices:*:*:*:*:*:*:*:* | 1 | OR | 6.5.0 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:A/AC:L/Au:S/C:C/I:C/A:C
- Access Vector
- ADJACENT_NETWORK
- Access Compatibility
- LOW
- Authentication
- SINGLE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 7.7
- Severity
- HIGH
- Exploitability Score
- 5.1
- Impact Score
- 10
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- ADJACENT_NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8
- Base Severity
- HIGH
- Exploitability Score
- 2.1
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
http://www.securityfocus.com/bid/90884 | Third Party Advisory VDB Entry |
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160607_00 | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2015-8798 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8798 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 16:06:26 | Added to TrackCVE | |||
2022-12-02 09:48:29 | 2016-06-08T14:59Z | 2016-06-08T14:59:06 | CVE Published Date | updated |
2022-12-02 09:48:29 | 2021-09-09T17:06:57 | CVE Modified Date | updated | |
2022-12-02 09:48:29 | Analyzed | Vulnerability Status | updated |