Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-4000

EPSS 93.74% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-4000

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
TLS 加密问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TLS是IETF标准组织的一个传输层安全性协议,目的是为互联网通信提供安全及数据完整性保障。 TLS协议1.2及之前版本中存在加密问题漏洞,该漏洞源于当服务器启用DHE_EXPORT密码套件时,程序没有正确传递DHE_EXPORT选项。攻击者可通过重写ClientHello(使用DHE_EXPORT取代DHE),然后重写ServerHello(使用DHE取代DHE_EXPORT),利用该漏洞实施中间人攻击和cipher-downgrade攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-4000

#POC DescriptionSource LinkShenlong Link
1✨ HAProxy ve Keepalived konusunu load balancer ve cluster'a ek olarak güvenlik(zayıf SSL/Kripto Kullanımı (LOGJAM) (CVE-2015-4000) zafiyeti önlemi) ve yüksek yüklere karşı ele alır.https://github.com/fatlan/HAProxy-Keepalived-Sec-HighLoadsPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-4000

Please Login to view more intelligence information

Same Patch Batch · n/a · 2015-05-21 · 9 CVEs total

CVE-2012-1978Simple PHP Agenda 跨站请求伪造漏洞
CVE-2015-3647WordPress WP Photo Album Plus插件输入验证漏洞
CVE-2015-4018WordPress FeedWordPress插件SQL注入漏洞
CVE-2015-3911Huawei E587 Mobile WiFi 权限许可和访问控制漏洞
CVE-2015-3912Huawei E355s Mobile WiFi 信息泄露漏洞
CVE-2015-0741Cisco Prime Central for Hosted Collaboration Solution 跨站请求伪造漏洞
CVE-2015-0742Cisco Adaptive Security Appliances Software Protocol Independent Multicast 代码注入漏洞
CVE-2015-3036Linux kernel KCodes NetUSB模块基于栈的缓冲区溢出漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2015-4000

No comments yet


Leave a comment