Lucene search

K
cveMitreCVE-2015-3326
HistoryMay 14, 2015 - 12:59 a.m.

CVE-2015-3326

2015-05-1400:59:03
mitre
web.nvd.nist.gov
32
trend micro
scanmail
microsoft exchange
smex
cve-2015-3326
web console
authentication
brute force attack
vulnerability

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

7.1

Confidence

Low

EPSS

0.003

Percentile

69.2%

Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote attackers to bypass authentication via a brute force attack.

Affected configurations

Nvd
Node
trend_microscanmailMatch10.2microsoft_exchange
OR
trend_microscanmailMatch11.0microsoft_exchange
VendorProductVersionCPE
trend_microscanmail10.2cpe:2.3:a:trend_micro:scanmail:10.2:*:*:*:*:microsoft_exchange:*:*
trend_microscanmail11.0cpe:2.3:a:trend_micro:scanmail:11.0:*:*:*:*:microsoft_exchange:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

7.1

Confidence

Low

EPSS

0.003

Percentile

69.2%

Related for CVE-2015-3326