CVE-2012-4605 (GCVE-0-2012-4605)
Vulnerability from cvelistv5
Published
2012-08-23 10:00
Modified
2024-08-06 20:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the "SurfControl plc\SuperScout Email Filter\SMTP" registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:42:54.595Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.websense.com/support/article/kbarticle/SSL-TLS-weak-and-export-ciphers-detected-in-Websense-Email-Security-deployments" }, { "name": "websense-smtp-info-disc(78131)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78131" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the \"SurfControl plc\\SuperScout Email Filter\\SMTP\" registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.websense.com/support/article/kbarticle/SSL-TLS-weak-and-export-ciphers-detected-in-Websense-Email-Security-deployments" }, { "name": "websense-smtp-info-disc(78131)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78131" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4605", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the \"SurfControl plc\\SuperScout Email Filter\\SMTP\" registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.websense.com/support/article/kbarticle/SSL-TLS-weak-and-export-ciphers-detected-in-Websense-Email-Security-deployments", "refsource": "CONFIRM", "url": "http://www.websense.com/support/article/kbarticle/SSL-TLS-weak-and-export-ciphers-detected-in-Websense-Email-Security-deployments" }, { "name": "websense-smtp-info-disc(78131)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78131" }, { "name": "64758", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64758" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4605", "datePublished": "2012-08-23T10:00:00", "dateReserved": "2012-08-23T00:00:00", "dateUpdated": "2024-08-06T20:42:54.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-4605\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-08-23T10:32:15.093\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the \\\"SurfControl plc\\\\SuperScout Email Filter\\\\SMTP\\\" registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.\"},{\"lang\":\"es\",\"value\":\"La configuraci\u00f3n por defecto en el componente SMTP en Websense Email Security v6.1 hasta la v7.3 utiliza cifrado SSL d\u00e9bil en la clave de registro en \\\"SurfControl plc\\\\SuperScout Email Filter\\\\SMTP\\\", lo cual hace posible para un atacante remoto obtener informaci\u00f3n sensible por medio del pinchado de la red y la realizaci\u00f3n de un ataque por fuerza bruta contra los datos encriptados de la sesi\u00f3n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:websense:websense_email_security:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B57542A-390F-4447-BD4A-CDD758D715D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:websense:websense_email_security:6.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9949AE6C-A57E-4B37-831E-DB4C462F5FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:websense:websense_email_security:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"806E0AAE-B313-4F37-9C9A-13CA9CEE57D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:websense:websense_email_security:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"098603E7-B186-451E-ACC6-113185D2D7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:websense:websense_email_security:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CB52986-7214-42A6-8721-0F203FCC4449\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/64758\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.websense.com/support/article/kbarticle/SSL-TLS-weak-and-export-ciphers-detected-in-Websense-Email-Security-deployments\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/78131\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/64758\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.websense.com/support/article/kbarticle/SSL-TLS-weak-and-export-ciphers-detected-in-Websense-Email-Security-deployments\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/78131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…