mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-15 07:40:25 +02:00
18 lines
974 B
Markdown
18 lines
974 B
Markdown
### [CVE-2015-8960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8960)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://kcitls.org
|
|
|
|
#### Github
|
|
No PoCs found on GitHub currently.
|
|
|