First published: Wed Feb 14 2001(Updated: )
The web administration interface for Interscan VirusWall 3.6.x and earlier does not use encryption, which could allow remote attackers to obtain the administrator password to sniff the administrator password via the setpasswd.cgi program or other HTTP GET requests that contain base64 encoded usernames and passwords.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan VirusWall | <=3.6 | |
Trend Micro InterScan VirusWall | =3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0133 is classified as a high-severity vulnerability due to its potential to expose sensitive authentication credentials.
To mitigate CVE-2001-0133, upgrade to an updated version of Interscan VirusWall that implements encryption for its web administration interface.
CVE-2001-0133 affects Interscan VirusWall versions 3.6.x and earlier.
An attacker could exploit CVE-2001-0133 to capture the administrator password through unencrypted HTTP requests.
A possible workaround for CVE-2001-0133 is to restrict access to the web administration interface through firewalls or by securing it behind a VPN.