CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
85.1%
CoSoSys Endpoint Protector 4 appliance contains a predictable password for root-equivalent accounts.
According to the CoSoSysβs website the Endpoint Protector 4 appliance is a DLP product used to _prevent users from taking unauthorized data outside the company or bringing potential harmful files on USB devices, files which can have a significant impact on your networkβs healt_h. The CoSoSys Endpoint Protector 4 appliance contains a predictable password for root-equivalent accounts. The activation script sets the password to the EPProot account to a password based on the sum of each number in the applianceβs serial number. The script cuts the serial number (10 numeric characters) out of a file and then adds each character together to populate the $SUMS variable. Then βeroot!00($SUM)ROβ where $SUM is a number presumably from 0-90 (9*10) is set as the password for the epproot account. There are only 90 unique combinations so it can be brute-forced.
An attacker may be able to gather sensitive configuration information including account credentials or session authentication tokens of the CoSoSys Endpoint Protector 4 appliance.
We are currently unaware of a practical solution to this problem.
Restrict access
As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from accessing a CoSoSys Endpoint Protector 4 appliance using stolen credentials from a blocked network location.
591667
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: July 30, 2012 Updated: September 10, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Temporal | 5.2 | E:POC/RL:W/RC:UC |
Environmental | 1.7 | CDP:LM/TD:L/CR:ND/IR:ND/AR:ND |
<http://www.endpointprotector.com/products/endpoint_protector>
Thanks to Christopher Campbell for reporting this vulnerability.
This document was written by Michael Orlando.
CVE IDs: | CVE-2012-2994 |
---|---|
Date Public: | 2012-09-17 Date First Published: |