Advisory

McAfee Network Security Manager Authentication Bypass and Session Hijacking Vulnerability

Advisory ID: SWRX-2009-002

Advisory Information

  • Title: McAfee Network Security Manager Authentication Bypass and Session Hijacking Vulnerability
  • Advisory ID: SWRX-2009-002
  • Date published: Wednesday, November 11, 2009
  • CVE: CVE-2009-3566
  • CVSS v2 Base Score: 4.3 (Medium) (AV:N/AC:M/Au:N/C:P/I:N/A:N)
  • Date of last update: Wednesday, November 11, 2009
  • Vendors contacted: McAfee, Inc.
  • Release mode: Coordinated release
  • Discovered by: Daniel King, SecureWorks

Summary

McAfee Network Security Manager is vulnerable to authentication bypass via HTTP session cookie hijacking. A remote attacker could exploit this vulnerability to hijack an existing session to the Network Security Manager.

Download the PDF

PGP Signature (PC Users: You may need to right click your mouse and select "Save As")

SecureWorks CTU Public Key



ABOUT THE AUTHOR
COUNTER THREAT UNIT RESEARCH TEAM

Secureworks Counter Threat Unit™ (CTU) researchers frequently serve as expert resources for the media, publish technical analyses for the security community, and speak about emerging threats at security conferences. Leveraging Secureworks’ advanced security technologies and a network of industry contacts, the CTU™ research team tracks threat actors and analyzes anomalous activity, uncovering new attack techniques and threats. This process enables CTU researchers to identify threats as they emerge and develop countermeasures that protect customers before damage can occur.
Revenir aux blogs

ESSAYEZ TAEGIS DÈS AUJOURD'HUI !

Voyez par vous-même : Demandez votre démo pour voir comment Taegis peut réduire les risques, optimiser les investissements de sécurité existants et pallier la pénurie de talents.