PHP Session Identifier Exposure in Symantec Endpoint Protection Manager
CVE-2016-3651
8HIGH
Summary
A vulnerability exists in Symantec Endpoint Protection Manager (SEPM) 12.1 prior to RU6 MP5, which allows remote authenticated users to potentially expose sensitive session information. Specifically, the vulnerability enables these users to retrieve the PHP JSESSIONID value through various unspecified methods. This exposure could lead to unauthorized access and manipulation of user sessions, posing significant risks to the confidentiality and integrity of the affected systems.
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved