Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2009-3555
CWE-295 — Improper Certificate ValidationCWE-20 — Improper Input ValidationCWE-30023 documents12 sources
Severity
5.8MEDIUM
EPSS
2.3%
top 15.30%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 9
Latest updateMay 2
Description
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and po…
CVSS vector
AV:N/AC:M/C:N/I:P/A:PExploitability: 8.6 | Impact: 4.9
Affected Packages13 packages
Also affects: Fedora 11, 12, 13, 14, Debian Linux 4.0, 5.0, 6.0, 7.0, 8.0, Ubuntu Linux 10.04, 10.10, 8.04, 8.10, 9.04, 9.10