MySQL and MariaDB SSL Vulnerability Allowing Man-in-the-Middle Attacks
CVE-2015-3152

5.9MEDIUM

Key Information:

Vendor
Oracle
Vendor
CVE Published:
16 May 2016

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability exists in Oracle MySQL and MariaDB that arises from an inadequate implementation of SSL options. Specifically, the SSL configuration allows attackers to downgrade secure connections to an insecure state, facilitating man-in-the-middle attacks. This flaw, often referred to in security communities as a 'BACKRONYM' attack, enables malicious entities to spoof servers and potentially intercept sensitive communications. Users of affected MySQL and MariaDB versions should promptly review their SSL settings and apply the necessary updates to secure their environments.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

.