First published: Sun Mar 02 2014(Updated: )
The caching feature in SGOS in Blue Coat ProxySG 5.5 through 5.5.11.3, 6.1 through 6.1.6.3, 6.2 through 6.2.15.3, 6.4 through 6.4.6.1, and 6.3 and 6.5 before 6.5.4 allows remote authenticated users to bypass intended access restrictions during a time window after account deletion or modification by leveraging knowledge of previously valid credentials.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Blue Coat ProxySG OS | >=5.5<=5.5.11.3 | |
Blue Coat ProxySG OS | >=6.1<=6.1.6.3 | |
Blue Coat ProxySG OS | >=6.2<=6.2.15.3 | |
Blue Coat ProxySG OS | >=6.4<=6.4.6.1 | |
Blue Coat ProxySG OS | >=6.5<6.5.4 | |
Blue Coat ProxySG OS | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2033 has a medium severity rating due to the potential for unauthorized access after account modifications.
To fix CVE-2014-2033, upgrade your Blue Coat ProxySG to a version later than 6.5.4 or apply any available patches provided by Blue Coat.
CVE-2014-2033 affects users of Blue Coat ProxySG versions 5.5 through 6.5.3.
CVE-2014-2033 is an access control vulnerability that allows authenticated users to bypass intended restrictions.
Attackers exploiting CVE-2014-2033 can gain unauthorized access following the deletion or modification of user accounts.