First published: Wed Oct 29 2014(Updated: )
The TLS/SSL Server in McAfee Network Data Loss Prevention (NDLP) before 9.3 uses weak cipher algorithms, which makes it easier for remote authenticated users to execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Network Data Loss Prevention | <=9.2.2 | |
Mcafee Network Data Loss Prevention | =8.6 | |
Mcafee Network Data Loss Prevention | =9.2.0 | |
Mcafee Network Data Loss Prevention | =9.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8531 has a high severity level due to its potential allowing remote code execution via weak ciphers.
To mitigate CVE-2014-8531, update McAfee Network Data Loss Prevention to a version after 9.3 that uses stronger cipher algorithms.
CVE-2014-8531 affects McAfee Network Data Loss Prevention versions 8.6 and 9.2.0 to 9.2.2.
Yes, CVE-2014-8531 can be exploited by remote authenticated users due to weak cipher algorithms.
Yes, official patches are provided in versions of McAfee Network Data Loss Prevention released after version 9.3.