First published: Fri Apr 30 2004(Updated: )
McAfee ePolicy Orchestrator (ePO) 2.5.1 Patch 13 and 3.0 SP2a Patch 3 allows remote attackers to execute arbitrary commands via certain HTTP POST requests to the spipe/file handler on ePO TCP port 81.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix ePolicy Orchestrator | =2.5.1 | |
Trellix ePolicy Orchestrator | =3.0 | |
Trellix ePolicy Orchestrator | =3.0-sp2a | |
Trellix ePolicy Orchestrator | =2.5 | |
Trellix ePolicy Orchestrator | =2.5-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0038 is considered a critical vulnerability due to the potential for remote command execution.
To mitigate CVE-2004-0038, apply the latest patches and updates provided by McAfee for ePolicy Orchestrator.
CVE-2004-0038 affects McAfee ePolicy Orchestrator versions 2.5.1, 3.0, 3.0 SP2a, 2.5, and 2.5 SP1.
CVE-2004-0038 allows remote attackers to execute arbitrary commands on the affected system.
No, CVE-2004-0038 can be exploited without authentication, making it particularly dangerous.