Lucene search

K
cveIbmCVE-2016-6025
HistoryOct 06, 2016 - 10:59 a.m.

CVE-2016-6025

2016-10-0610:59:06
CWE-264
ibm
web.nvd.nist.gov
20
ibm
sterling
secure proxy
configuration manager
remote attackers
access
post-logoff
nvd
cve-2016-6025

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

5.9

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

6

Confidence

High

EPSS

0.002

Percentile

60.1%

The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows remote attackers to obtain access by leveraging an unattended workstation to conduct a post-logoff session-reuse attack involving a modified URL.

Affected configurations

Nvd
Node
ibmsterling_secure_proxyMatch3.4.2.0
OR
ibmsterling_secure_proxyMatch3.4.2.0ifix1
OR
ibmsterling_secure_proxyMatch3.4.2.0ifix2
OR
ibmsterling_secure_proxyMatch3.4.2.0ifix3
OR
ibmsterling_secure_proxyMatch3.4.2.0ifix4
OR
ibmsterling_secure_proxyMatch3.4.2.0ifix5
OR
ibmsterling_secure_proxyMatch3.4.2.0ifix6
OR
ibmsterling_secure_proxyMatch3.4.2.0ifix7
OR
ibmsterling_secure_proxyMatch3.4.3.0
VendorProductVersionCPE
ibmsterling_secure_proxy3.4.2.0cpe:2.3:a:ibm:sterling_secure_proxy:3.4.2.0:*:*:*:*:*:*:*
ibmsterling_secure_proxy3.4.2.0cpe:2.3:a:ibm:sterling_secure_proxy:3.4.2.0:ifix1:*:*:*:*:*:*
ibmsterling_secure_proxy3.4.2.0cpe:2.3:a:ibm:sterling_secure_proxy:3.4.2.0:ifix2:*:*:*:*:*:*
ibmsterling_secure_proxy3.4.2.0cpe:2.3:a:ibm:sterling_secure_proxy:3.4.2.0:ifix3:*:*:*:*:*:*
ibmsterling_secure_proxy3.4.2.0cpe:2.3:a:ibm:sterling_secure_proxy:3.4.2.0:ifix4:*:*:*:*:*:*
ibmsterling_secure_proxy3.4.2.0cpe:2.3:a:ibm:sterling_secure_proxy:3.4.2.0:ifix5:*:*:*:*:*:*
ibmsterling_secure_proxy3.4.2.0cpe:2.3:a:ibm:sterling_secure_proxy:3.4.2.0:ifix6:*:*:*:*:*:*
ibmsterling_secure_proxy3.4.2.0cpe:2.3:a:ibm:sterling_secure_proxy:3.4.2.0:ifix7:*:*:*:*:*:*
ibmsterling_secure_proxy3.4.3.0cpe:2.3:a:ibm:sterling_secure_proxy:3.4.3.0:*:*:*:*:*:*:*

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

5.9

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

6

Confidence

High

EPSS

0.002

Percentile

60.1%

Related for CVE-2016-6025