CVE-2015-8960
highCVSS v3 Base Score
8.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score
0.3%
Exploitation probability in 30 days
Top 44% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Confidentiality
High
Integrity
High
Availability
High
Published: September 21, 2016 (3523 days ago)
Last Modified: May 6, 2026
Vendor: Microsoft
Source: NVD
Vulnerability Report
Generated by CyberWatcher
Description
The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.
CWE
CWE-295Affected Products
ietf transport layer securitynetapp clustered data ontap antivirus connectornetapp data ontap edgenetapp host agentnetapp oncommand shiftnetapp plug-in for symantec netbackupnetapp smi-s providernetapp snap creator frameworknetapp snapdrivenetapp snapmanager