Search for vulnerabilities
Vulnerability details: VCID-3tgf-zdd4-2yfv
Vulnerability ID VCID-3tgf-zdd4-2yfv
Aliases CVE-2015-3908
GHSA-w64c-pxjj-h866
PYSEC-2015-1
Summary Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2015-07/msg00051.html
generic_textual HIGH http://lists.opensuse.org/opensuse-updates/2015-07/msg00051.html
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2015-08/msg00029.html
generic_textual HIGH http://lists.opensuse.org/opensuse-updates/2015-08/msg00029.html
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.0008 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2015-3908
cvssv3.1 7.5 https://github.com/advisories/GHSA-w64c-pxjj-h866
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-w64c-pxjj-h866
generic_textual HIGH https://github.com/advisories/GHSA-w64c-pxjj-h866
cvssv3.1 7.5 https://github.com/ansible/ansible
generic_textual HIGH https://github.com/ansible/ansible
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2015-1.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2015-1.yaml
cvssv3.1 7.5 https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2015-3908
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2015-3908
cvssv3.1 7.5 http://www.ansible.com/security
generic_textual HIGH http://www.ansible.com/security
cvssv3.1 7.5 http://www.openwall.com/lists/oss-security/2015/07/14/4
generic_textual HIGH http://www.openwall.com/lists/oss-security/2015/07/14/4
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://lists.opensuse.org/opensuse-updates/2015-07/msg00051.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://lists.opensuse.org/opensuse-updates/2015-08/msg00029.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/advisories/GHSA-w64c-pxjj-h866
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/ansible/ansible
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2015-1.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2015-3908
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.ansible.com/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.openwall.com/lists/oss-security/2015/07/14/4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.24616
EPSS Score 0.0008
Published At Aug. 2, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:05:41.326499+00:00 Pypa Importer Import https://github.com/pypa/advisory-database/blob/main/vulns/ansible/PYSEC-2015-1.yaml 37.0.0