First published: Wed Oct 29 2014(Updated: )
McAfee Network Data Loss Prevention (NDLP) before 9.3 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Network Data Loss Prevention | <=9.2.2 | |
Mcafee Network Data Loss Prevention | =8.6 | |
Mcafee Network Data Loss Prevention | =9.2.0 | |
Mcafee Network Data Loss Prevention | =9.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8525 is classified as a medium severity vulnerability due to its potential to expose sensitive session cookie information.
To fix CVE-2014-8525, upgrade to McAfee Network Data Loss Prevention version 9.3 or later, which includes the HTTPOnly flag in Set-Cookie headers.
CVE-2014-8525 affects McAfee Network Data Loss Prevention versions prior to 9.3, including versions 8.6, 9.2.0, 9.2.1, and 9.2.2.
CVE-2014-8525 poses a risk of session hijacking, as attackers can potentially access sensitive information stored in cookies without the HTTPOnly flag.
There are no effective workarounds for CVE-2014-8525; patching to a version that sets the HTTPOnly flag is strongly recommended.