First published: Wed Aug 29 2012(Updated: )
Symantec Messaging Gateway (SMG) before 10.0 has a default password for an unspecified account, which makes it easier for remote attackers to obtain privileged access via an SSH session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Symantec Messaging Gateway | <=9.5.4 | |
Broadcom Symantec Messaging Gateway | =9.5 | |
Broadcom Symantec Messaging Gateway | =9.5.1 | |
Broadcom Symantec Messaging Gateway | =9.5.2 | |
Broadcom Symantec Messaging Gateway | =9.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3579 is classified as a high severity vulnerability due to its potential for unauthorized privileged access.
To fix CVE-2012-3579, update your Symantec Messaging Gateway to version 10.0 or later and ensure that default passwords are changed immediately.
CVE-2012-3579 affects Symantec Messaging Gateway versions prior to 10.0, including any version in the 9.5 range.
CVE-2012-3579 is a default password vulnerability allowing remote attackers to gain privileged access via SSH.
Yes, CVE-2012-3579 is exploitable by attackers who can guess or utilize the default password to log into the affected systems.