TLS Handshake Protocol Vulnerability in Apple OS X

TLS Handshake Protocol Vulnerability in Apple OS X

CVE-2015-5887 · HIGH Severity

AV:N/AC:L/AU:N/C:C/I:C/A:C

The TLS Handshake Protocol implementation in Secure Transport in Apple OS X before 10.11 accepts a Certificate Request message within a session in which no Server Key Exchange message has been sent, which allows remote attackers to have an unspecified impact via crafted TLS data.

Learn more about our Cis Benchmark Audit For Microsoft Exchange Server.