Authentication Bypass Vulnerability in Intel Security VirusScan Enterprise Linux
CVE-2016-8023
8.1HIGH
Summary
The vulnerability in Intel Security's VirusScan Enterprise Linux (VSEL) allows an unauthenticated remote attacker to bypass server authentication by exploiting a weakness in the handling of authentication tokens. Specifically, this issue arises due to mishandling of crafted authentication cookies, enabling attackers to gain unauthorized access to the server. Organizations utilizing VSEL versions 2.0.3 and earlier should consider immediate measures to address this security flaw to prevent potential exploitation.
Affected Version(s)
VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier)
References
EPSS Score
9% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved