ID CVE-2015-3326
Summary Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote attackers to bypass authentication via a brute force attack. <a href="https://cwe.mitre.org/data/definitions/330.html">CWE-330: Use of Insufficiently Random Values</a>
References
Vulnerable Configurations
  • cpe:2.3:a:trend_micro:scanmail:10.2:*:*:*:*:microsoft_exchange:*:*
    cpe:2.3:a:trend_micro:scanmail:10.2:*:*:*:*:microsoft_exchange:*:*
  • cpe:2.3:a:trend_micro:scanmail:11.0:*:*:*:*:microsoft_exchange:*:*
    cpe:2.3:a:trend_micro:scanmail:11.0:*:*:*:*:microsoft_exchange:*:*
CVSS
Base: 5.0 (as of 03-01-2017 - 03:00)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 74661
confirm http://esupport.trendmicro.com/solution/en-US/1109669.aspx
misc http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html
sectrack 1032323
Last major update 03-01-2017 - 03:00
Published 14-05-2015 - 00:59
Last modified 03-01-2017 - 03:00
Back to Top