First published: Tue Mar 18 2014(Updated: )
Directory traversal vulnerability in McAfee Cloud Identity Manager 3.0, 3.1, and 3.5.1, McAfee Cloud Single Sign On (MCSSO) before 4.0.1, and Intel Expressway Cloud Access 360-SSO 2.1 and 2.5 allows remote authenticated users to read an unspecified file containing a hash of the administrator password via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Expressway Cloud Access 360 | =2.1 | |
Intel Expressway Cloud Access 360 | =2.5 | |
McAfee Cloud Identity Manager | =3.0 | |
McAfee Cloud Identity Manager | =3.1 | |
McAfee Cloud Identity Manager | =3.5.1 | |
McAfee Cloud Single Sign On | =4.0.0 | |
=2.1 | ||
=2.5 | ||
=3.0 | ||
=3.1 | ||
=3.5.1 | ||
=4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2536 has a medium severity rating due to the potential exposure of sensitive information.
To fix CVE-2014-2536, upgrade to the latest versions of affected software which are patched against this vulnerability.
CVE-2014-2536 affects McAfee Cloud Identity Manager versions 3.0, 3.1, 3.5.1, and McAfee Cloud Single Sign On versions before 4.0.1.
Yes, CVE-2014-2536 can be exploited remotely by authenticated users.
CVE-2014-2536 allows unauthorized access to files containing sensitive data, including hashes of the administrator password.