First published: Wed Aug 22 2012(Updated: )
McAfee Email and Web Security (EWS) 5.5 through Patch 6 and 5.6 through Patch 3, and McAfee Email Gateway (MEG) 7.0.0 and 7.0.1, allows remote attackers to bypass authentication and obtain an admin session ID via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Email and Web Security | =5.5 | |
McAfee Email and Web Security | =5.6 | |
McAfee Email Gateway | =7.0.0 | |
McAfee Email Gateway | =7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4595 has been classified with a high severity due to the potential for remote attackers to bypass authentication.
To mitigate CVE-2012-4595, it is recommended to update McAfee Email and Web Security or Email Gateway to the latest patches provided by McAfee.
CVE-2012-4595 affects McAfee Email and Web Security versions 5.5 through Patch 6 and 5.6 through Patch 3, as well as McAfee Email Gateway versions 7.0.0 and 7.0.1.
Yes, CVE-2012-4595 can allow attackers to obtain an admin session ID, potentially giving them access to sensitive data.
While specific exploits for CVE-2012-4595 have not been publicly disclosed, the vulnerability allows for unauthorized access, highlighting the importance of implementing corrective updates.