{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T10:19:09.504","vulnerabilities":[{"cve":{"id":"CVE-2017-15533","sourceIdentifier":"secure@symantec.com","published":"2018-05-17T13:29:00.210","lastModified":"2024-11-21T03:14:44.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Symantec SSL Visibility (SSLV) 3.8.4FC, 3.10 prior to 3.10.4.1, 3.11, and 3.12 prior to 3.12.2.1 are vulnerable to the Return of the Bleichenbacher Oracle Threat (ROBOT) attack. All affected SSLV versions act as weak oracles according the oracle classification used in the ROBOT research paper. A remote attacker, who has captured a pre-recorded SSL session inspected by SSLV, can establish multiple millions of crafted SSL connections to the target and obtain the session keys required to decrypt the pre-recorded SSL session."},{"lang":"es","value":"Symantec SSL Visibility (SSLV) 3.8.4FC, versiones 3.10 anteriores a la 3.10.4.1, 3.11, y versiones 3.12 anteriores a la 3.12.2.1 son vulnerables a un ataque ROBOT (Return of the Bleichenbacher Oracle Threat). Todas las versiones afectadas de SSLV actúan como oráculos débiles, según la clasificación de oráculos empleada en el documento de investigación de ROBOT. Un atacante remoto que haya capturado una sesión SSL previamente grabada inspeccionada por SSLV puede establecer millones de conexiones SSL manipuladas en el objetivo y obtener las claves de sesión necesarias para descifrar la sesión SSL pregrabada."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-203"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:ssl_visibility_appliance:3.8.4fc:*:*:*:*:*:*:*","matchCriteriaId":"5207441A-FB6D-400F-9151-012DCF01885B"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:ssl_visibility_appliance:3.10:*:*:*:*:*:*:*","matchCriteriaId":"629C7D06-4DD7-478E-831D-4F6DB9DFF8AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:ssl_visibility_appliance:3.11:*:*:*:*:*:*:*","matchCriteriaId":"B231AB3B-4BFD-4A7A-928C-CDF23FD21D48"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:ssl_visibility_appliance:3.12:*:*:*:*:*:*:*","matchCriteriaId":"52526D68-F66D-459B-A007-F32BEAFB5CA8"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/104163","source":"secure@symantec.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.symantec.com/security-center/network-protection-security-advisories/SA160","source":"secure@symantec.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/104163","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.symantec.com/security-center/network-protection-security-advisories/SA160","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}