- Description
- The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the "SurfControl plc\SuperScout Email Filter\SMTP" registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
- nvd@nist.gov
- CWE-200
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:websense:websense_email_security:6.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6B57542A-390F-4447-BD4A-CDD758D715D6"
},
{
"criteria": "cpe:2.3:a:websense:websense_email_security:6.1:sp1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9949AE6C-A57E-4B37-831E-DB4C462F5FB4"
},
{
"criteria": "cpe:2.3:a:websense:websense_email_security:7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "806E0AAE-B313-4F37-9C9A-13CA9CEE57D7"
},
{
"criteria": "cpe:2.3:a:websense:websense_email_security:7.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "098603E7-B186-451E-ACC6-113185D2D7DE"
},
{
"criteria": "cpe:2.3:a:websense:websense_email_security:7.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0CB52986-7214-42A6-8721-0F203FCC4449"
}
],
"operator": "OR"
}
]
}
]