Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2016-0149

CVE information

Published

6 years ago

Last Modified

3 years ago

CVSSv2.0 Severity

Medium

CVSSv3.1 Severity

Medium

Impact Analysis

Description

Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 allows man-in-the-middle attackers to obtain sensitive cleartext information via vectors involving injection of cleartext data into the client-server data stream, aka "TLS/SSL Information Disclosure Vulnerability.".

CVSSv2.0 Score

Severity
Medium
Base Score
4.3/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
Partial
Availability Impact
None
Integrity Impact
None

CVSSv3.1 Score

Severity
Medium
Base Score
5.9/10
Exploit Score
2.2/10
Access Vector
Network
Access Complexity
High
Privileges Required
None
Impact Score
3.6/10
Confidentiality Impact
High
Availability Impact
None
Integrity Impact
None
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*
  Yes
- -