CVE-2015-4458
Description
The TLS implementation in the Cavium cryptographic-module firmware, as distributed with Cisco Adaptive Security Appliance (ASA) Software 9.1(5.21) and other products, does not verify the MAC field, which allows man-in-the-middle attackers to spoof TLS content by modifying packets, aka Bug ID CSCuu52976.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cavium cryptographic-module firmware in Cisco ASA 9.1(5.21) lacks MAC verification, allowing man-in-the-middle attackers to spoof TLS content.
Vulnerability
The TLS implementation in the Cavium cryptographic-module firmware, as distributed with Cisco Adaptive Security Appliance (ASA) Software version 9.1(5.21) and potentially other products, does not verify the Message Authentication Code (MAC) field. This flaw enables attackers to modify TLS packets without detection. The affected firmware is part of the Cavium cryptographic module, a third-party component integrated into Cisco ASA and possibly other vendors' products. The vulnerability is identified by Cisco Bug ID CSCuu52976 [1].
Exploitation
A man-in-the-middle attacker positioned between the ASA device and the TLS endpoint can exploit this vulnerability by intercepting and altering TLS packets. Since the MAC is not validated, the attacker can modify the content of the encrypted TLS stream without causing a protocol-level error. The attacker does not require authentication or prior access to the device; only network access to the communication path is needed. The attack does not require user interaction and can be executed in real time.
Impact
Successful exploitation allows the attacker to spoof TLS content, effectively compromising the integrity of encrypted communications. This can lead to data manipulation, injection of malicious payloads, or undermining trust in the TLS session. While the confidentiality of the initial encryption is not directly broken, the lack of MAC verification undermines the integrity guarantee of TLS, potentially enabling further attacks such as content injection or session hijacking.
Mitigation
Cisco has not released a fix specific to this issue as it is a third-party (Cavium) vulnerability. Cisco stopped publishing non-Cisco product alerts in 2019 [1]. Affected users should consult Cavium (now part of Marvell) for firmware updates that implement proper MAC verification. As a workaround, network segmentation and strict monitoring of TLS traffic can reduce exposure. No KEV listing was identified for this CVE.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3- cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*
- Range: 9.1(5.21) and other products
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- tools.cisco.com/security/center/viewAlert.xnvdVendor Advisory
- www.securitytracker.com/id/1032927nvd
News mentions
0No linked articles in our index yet.