Lucene search

K
cve[email protected]CVE-2012-4605
HistoryAug 23, 2012 - 10:32 a.m.

CVE-2012-4605

2012-08-2310:32:15
CWE-200
web.nvd.nist.gov
26
cve-2012-4605
websense email security
smtp
ssl ciphers
sensitive information
network sniffing
brute-force attack
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

6.2 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

70.4%

The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the “SurfControl plc\SuperScout Email Filter\SMTP” registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.

Affected configurations

NVD
Node
websensewebsense_email_securityMatch6.1
OR
websensewebsense_email_securityMatch6.1sp1
OR
websensewebsense_email_securityMatch7.0
OR
websensewebsense_email_securityMatch7.1
OR
websensewebsense_email_securityMatch7.2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

6.2 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

70.4%