- Description
- McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not disable the server-side session token upon the closing of the Management Console/Dashboard, which makes it easier for remote attackers to hijack sessions by capturing a session cookie and then modifying the response to a login attempt, related to a "Logout Failure" issue.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-287
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mcafee:email_and_web_security:5.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "66A3B3D7-D6F2-4AE9-89BA-3B39896D6DBE"
},
{
"criteria": "cpe:2.3:a:mcafee:email_and_web_security:5.5:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C8E57CF1-7D4D-45E9-A74D-51D6C7940F26"
},
{
"criteria": "cpe:2.3:a:mcafee:email_and_web_security:5.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "36F5B0E9-0B28-4DAD-91C9-0E722D79AC46"
},
{
"criteria": "cpe:2.3:a:mcafee:email_gateway:7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "46F5DE96-C4C2-498A-AD79-82BEC9A7DF5B"
}
],
"operator": "OR"
}
]
}
]