CVE-2012-4605

The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the "SurfControl plc\SuperScout Email Filter\SMTP" registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:websense:websense_email_security:6.1:*:*:*:*:*:*:*
cpe:2.3:a:websense:websense_email_security:6.1:sp1:*:*:*:*:*:*
cpe:2.3:a:websense:websense_email_security:7.0:*:*:*:*:*:*:*
cpe:2.3:a:websense:websense_email_security:7.1:*:*:*:*:*:*:*
cpe:2.3:a:websense:websense_email_security:7.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:43

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/64758 - () http://www.securityfocus.com/bid/64758 -
References () http://www.websense.com/support/article/kbarticle/SSL-TLS-weak-and-export-ciphers-detected-in-Websense-Email-Security-deployments - Vendor Advisory () http://www.websense.com/support/article/kbarticle/SSL-TLS-weak-and-export-ciphers-detected-in-Websense-Email-Security-deployments - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/78131 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/78131 -

Information

Published : 2012-08-23 10:32

Updated : 2024-11-21 01:43


NVD link : CVE-2012-4605

Mitre link : CVE-2012-4605

CVE.ORG link : CVE-2012-4605


JSON object : View

Products Affected

websense

  • websense_email_security
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor