VYPR
Unrated severityNVD Advisory· Published Apr 1, 2015· Updated May 6, 2026

CVE-2015-2808

CVE-2015-2808

Description

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

Affected products

105
  • cpe:2.3:a:huawei:oceanstor_replicationdirector:v100r003c00:*:*:*:*:*:*:*
  • cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:*
    • cpe:2.3:a:huawei:policy_center:v100r003c10:*:*:*:*:*:*:*
  • Huawei/Smc2.04 versions
    cpe:2.3:a:huawei:smc2.0:v100r002c01:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:huawei:smc2.0:v100r002c01:*:*:*:*:*:*:*
    • cpe:2.3:a:huawei:smc2.0:v100r002c02:*:*:*:*:*:*:*
    • cpe:2.3:a:huawei:smc2.0:v100r002c03:*:*:*:*:*:*:*
    • cpe:2.3:a:huawei:smc2.0:v100r002c04:*:*:*:*:*:*:*
  • cpe:2.3:a:huawei:ultravr:v100r003c00:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:cognos_metrics_manager:10.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:cognos_metrics_manager:10.2:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:cognos_metrics_manager:10.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:cognos_metrics_manager:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*
    Range: >=3.0.0,<=3.9.0
  • cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*
    Range: <9.9.2
  • cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*
  • Red Hat/Satellite2 versions
    cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
    • cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
  • cpe:2.3:a:suse:manager:1.7:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 2 more
    • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*
    Range: >=xcp,<xcp_1121
  • cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*
    Range: >=xcp,<xcp_1121
  • cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*
    Range: >=xcp,<xcp_1121
  • cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*
    Range: >=xcp,<xcp_1121
  • cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*
    Range: >=xcp,<xcp_1121
  • cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:e6000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:e9000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_18500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_18800f_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_18800_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_9000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_cse_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_s2600t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_s5500t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_s5600t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_s5800t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_s6800t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:oceanstor_vis6600t_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s2700_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s3700_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s5700ei_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s5700hi_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s5700si_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s5710ei_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s5710hi_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s5720ei_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s6700_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:te60_firmware:-:*:*:*:*:*:*:*
  • OpenSUSE/openSUSE2 versions
    cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
  • cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*
    Range: >=3.0.0,<=3.2.11
  • cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*+ 7 more
    • cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*+ 4 more
    • cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

101

News mentions

0

No linked articles in our index yet.