CVE-2012-4605
Published Aug 23, 2012
Last updated 7 years ago
Overview
- Description
- The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the "SurfControl plc\SuperScout Email Filter\SMTP" registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:websense:websense_email_security:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B57542A-390F-4447-BD4A-CDD758D715D6" }, { "criteria": "cpe:2.3:a:websense:websense_email_security:6.1:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9949AE6C-A57E-4B37-831E-DB4C462F5FB4" }, { "criteria": "cpe:2.3:a:websense:websense_email_security:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "806E0AAE-B313-4F37-9C9A-13CA9CEE57D7" }, { "criteria": "cpe:2.3:a:websense:websense_email_security:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "098603E7-B186-451E-ACC6-113185D2D7DE" }, { "criteria": "cpe:2.3:a:websense:websense_email_security:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB52986-7214-42A6-8721-0F203FCC4449" } ], "operator": "OR" } ] } ]