First published: Tue Jul 07 2009(Updated: )
The web-based management interfaces in Sourcefire Defense Center (DC) and 3D Sensor before 4.8.2 allow remote authenticated users to gain privileges via a $admin value for the admin parameter in an edit action to admin/user/user.cgi and unspecified other components.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sourcefire Defense Center | =4.8.0.3 | |
Sourcefire 3D Sensor | <=4.8.1 | |
Cisco Sourcefire Defense Center | =4.8.0.4 | |
Cisco Sourcefire Defense Center | =4.8 | |
Sourcefire 3D Sensor | =4.8.0.4 | |
Sourcefire 3D Sensor | =4.8 | |
Sourcefire 3D Sensor | =4.8.0.3 | |
Cisco Sourcefire Defense Center | <=4.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2344 has been classified with a high severity due to the risk of remote authenticated users gaining privileged access.
To mitigate CVE-2009-2344, update Sourcefire Defense Center and 3D Sensor to version 4.8.2 or later.
CVE-2009-2344 affects users of Sourcefire Defense Center versions up to 4.8.1 and 3D Sensor versions up to 4.8.1.
CVE-2009-2344 is a privilege escalation vulnerability that allows unauthorized access to admin features.
No, only remote authenticated users can exploit CVE-2009-2344 to gain elevated privileges.