Search for vulnerabilities
Vulnerability details: VCID-m67w-mzaf-duch
Vulnerability ID VCID-m67w-mzaf-duch
Aliases CVE-2014-3566
Summary
Status Published
Exploitability 2.0
Weighted Severity 2.9
Risk 5.8
Affected and Fixed Packages Package Details
Weaknesses (2)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3566.json
https://api.first.org/data/v1/epss?cve=CVE-2014-3566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1152789 https://bugzilla.redhat.com/show_bug.cgi?id=1152789
765539 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765539
RHSA-2014:1876 https://access.redhat.com/errata/RHSA-2014:1876
RHSA-2014:1877 https://access.redhat.com/errata/RHSA-2014:1877
RHSA-2014:1880 https://access.redhat.com/errata/RHSA-2014:1880
RHSA-2014:1881 https://access.redhat.com/errata/RHSA-2014:1881
RHSA-2014:1882 https://access.redhat.com/errata/RHSA-2014:1882
RHSA-2014:1920 https://access.redhat.com/errata/RHSA-2014:1920
RHSA-2015:0010 https://access.redhat.com/errata/RHSA-2015:0010
RHSA-2015:0011 https://access.redhat.com/errata/RHSA-2015:0011
RHSA-2015:0012 https://access.redhat.com/errata/RHSA-2015:0012
RHSA-2015:0067 https://access.redhat.com/errata/RHSA-2015:0067
RHSA-2015:0068 https://access.redhat.com/errata/RHSA-2015:0068
RHSA-2015:0069 https://access.redhat.com/errata/RHSA-2015:0069
RHSA-2015:0079 https://access.redhat.com/errata/RHSA-2015:0079
RHSA-2015:0080 https://access.redhat.com/errata/RHSA-2015:0080
RHSA-2015:0085 https://access.redhat.com/errata/RHSA-2015:0085
RHSA-2015:0086 https://access.redhat.com/errata/RHSA-2015:0086
RHSA-2015:0264 https://access.redhat.com/errata/RHSA-2015:0264
RHSA-2015:1545 https://access.redhat.com/errata/RHSA-2015:1545
RHSA-2015:1546 https://access.redhat.com/errata/RHSA-2015:1546
USN-2486-1 https://usn.ubuntu.com/2486-1/
USN-2487-1 https://usn.ubuntu.com/2487-1/
Data source Metasploit
Description Check if a server supports a given version of SSL/TLS and cipher suites. The certificate is stored in loot, and any known vulnerabilities against that SSL version and cipher suite combination are checked. These checks include POODLE, deprecated protocols, expired/not valid certs, low key strength, null cipher suites, certificates signed with MD5, DROWN, RC4 ciphers, exportable ciphers, LOGJAM, and BEAST.
Note
{}
Ransomware campaign use Unknown
Source publication date Oct. 14, 2014
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/ssl/ssl_version.rb
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.99898
EPSS Score 0.94084
Published At Aug. 2, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:35:36.063028+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/2486-1/ 37.0.0