Search for vulnerabilities
Vulnerability details: VCID-7svy-v5cp-u3fd
Vulnerability ID VCID-7svy-v5cp-u3fd
Aliases CVE-2015-7575
Summary Security researcher Karthikeyan Bhargavan reported an issue in Network Security Services (NSS) where MD5 signatures in the server signature within the TLS 1.2 ServerKeyExchange message are still accepted. This is an issue since NSS has officially disallowed the accepting MD5 as a hash algorithm in signatures since 2011. This issues exposes NSS based clients such as Firefox to theoretical collision-based forgery attacks. This issue was fixed in NSS version 3.20.2.
Status Published
Exploitability 0.5
Weighted Severity 2.1
Risk 1.1
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
https://api.first.org/data/v1/epss?cve=CVE-2015-7575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1289841 https://bugzilla.redhat.com/show_bug.cgi?id=1289841
CVE-2015-7575 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
mfsa2015-150 https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
RHSA-2016:0007 https://access.redhat.com/errata/RHSA-2016:0007
RHSA-2016:0008 https://access.redhat.com/errata/RHSA-2016:0008
RHSA-2016:0012 https://access.redhat.com/errata/RHSA-2016:0012
RHSA-2016:0049 https://access.redhat.com/errata/RHSA-2016:0049
RHSA-2016:0050 https://access.redhat.com/errata/RHSA-2016:0050
RHSA-2016:0053 https://access.redhat.com/errata/RHSA-2016:0053
RHSA-2016:0054 https://access.redhat.com/errata/RHSA-2016:0054
RHSA-2016:0055 https://access.redhat.com/errata/RHSA-2016:0055
RHSA-2016:0056 https://access.redhat.com/errata/RHSA-2016:0056
RHSA-2016:0098 https://access.redhat.com/errata/RHSA-2016:0098
RHSA-2016:0099 https://access.redhat.com/errata/RHSA-2016:0099
RHSA-2016:0100 https://access.redhat.com/errata/RHSA-2016:0100
RHSA-2016:0101 https://access.redhat.com/errata/RHSA-2016:0101
RHSA-2016:1430 https://access.redhat.com/errata/RHSA-2016:1430
USN-2863-1 https://usn.ubuntu.com/2863-1/
USN-2864-1 https://usn.ubuntu.com/2864-1/
USN-2865-1 https://usn.ubuntu.com/2865-1/
USN-2866-1 https://usn.ubuntu.com/2866-1/
USN-2884-1 https://usn.ubuntu.com/2884-1/
USN-2904-1 https://usn.ubuntu.com/2904-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.8293
EPSS Score 0.02005
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:10:52.864235+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2015/mfsa2015-150.md 37.0.0