Authentication Bypass Vulnerability in Intel Security VirusScan Enterprise Linux
CVE-2016-8023

8.1HIGH

Key Information:

Vendor
Intel
Vendor
CVE Published:
14 March 2017

Summary

The vulnerability in Intel Security's VirusScan Enterprise Linux (VSEL) allows an unauthenticated remote attacker to bypass server authentication by exploiting a weakness in the handling of authentication tokens. Specifically, this issue arises due to mishandling of crafted authentication cookies, enabling attackers to gain unauthorized access to the server. Organizations utilizing VSEL versions 2.0.3 and earlier should consider immediate measures to address this security flaw to prevent potential exploitation.

Affected Version(s)

VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier)

References

EPSS Score

9% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.